Dec 13 14:29:43.063263 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:29:43.063293 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:29:43.063308 kernel: BIOS-provided physical RAM map: Dec 13 14:29:43.063317 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 14:29:43.063325 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 14:29:43.063334 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 14:29:43.063346 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 14:29:43.063354 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 14:29:43.063361 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 14:29:43.063370 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 14:29:43.063378 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable Dec 13 14:29:43.063385 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 14:29:43.063392 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 14:29:43.063399 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 14:29:43.063409 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 14:29:43.063433 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 14:29:43.063443 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 14:29:43.063451 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 14:29:43.063457 kernel: NX (Execute Disable) protection: active Dec 13 14:29:43.063463 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 14:29:43.063469 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable Dec 13 14:29:43.063478 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 14:29:43.063484 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable Dec 13 14:29:43.063490 kernel: extended physical RAM map: Dec 13 14:29:43.063496 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 14:29:43.063504 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable Dec 13 14:29:43.063510 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS Dec 13 14:29:43.063517 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable Dec 13 14:29:43.063524 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS Dec 13 14:29:43.063532 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable Dec 13 14:29:43.063539 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS Dec 13 14:29:43.063546 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable Dec 13 14:29:43.063554 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable Dec 13 14:29:43.063561 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable Dec 13 14:29:43.063569 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable Dec 13 14:29:43.063576 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable Dec 13 14:29:43.063586 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved Dec 13 14:29:43.063592 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data Dec 13 14:29:43.063598 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS Dec 13 14:29:43.063605 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable Dec 13 14:29:43.063614 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved Dec 13 14:29:43.063621 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS Dec 13 14:29:43.063627 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 14:29:43.063635 kernel: efi: EFI v2.70 by EDK II Dec 13 14:29:43.063641 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 Dec 13 14:29:43.063648 kernel: random: crng init done Dec 13 14:29:43.063654 kernel: SMBIOS 2.8 present. Dec 13 14:29:43.063661 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 Dec 13 14:29:43.063667 kernel: Hypervisor detected: KVM Dec 13 14:29:43.063674 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:29:43.063680 kernel: kvm-clock: cpu 0, msr 3019a001, primary cpu clock Dec 13 14:29:43.063687 kernel: kvm-clock: using sched offset of 5504108122 cycles Dec 13 14:29:43.063698 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:29:43.063705 kernel: tsc: Detected 2794.748 MHz processor Dec 13 14:29:43.063712 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:29:43.063719 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:29:43.063726 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 Dec 13 14:29:43.063733 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:29:43.063739 kernel: Using GB pages for direct mapping Dec 13 14:29:43.063746 kernel: Secure boot disabled Dec 13 14:29:43.063752 kernel: ACPI: Early table checksum verification disabled Dec 13 14:29:43.063760 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) Dec 13 14:29:43.063767 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) Dec 13 14:29:43.063774 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:29:43.063780 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:29:43.063787 kernel: ACPI: FACS 0x000000009CBDD000 000040 Dec 13 14:29:43.063794 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:29:43.063800 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:29:43.063809 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:29:43.063816 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:29:43.063824 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) Dec 13 14:29:43.063831 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] Dec 13 14:29:43.063838 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] Dec 13 14:29:43.063844 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] Dec 13 14:29:43.063851 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] Dec 13 14:29:43.063857 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] Dec 13 14:29:43.063864 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] Dec 13 14:29:43.063870 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] Dec 13 14:29:43.063877 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] Dec 13 14:29:43.063885 kernel: No NUMA configuration found Dec 13 14:29:43.063894 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] Dec 13 14:29:43.063900 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] Dec 13 14:29:43.063907 kernel: Zone ranges: Dec 13 14:29:43.063914 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:29:43.063920 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] Dec 13 14:29:43.063927 kernel: Normal empty Dec 13 14:29:43.063933 kernel: Movable zone start for each node Dec 13 14:29:43.063940 kernel: Early memory node ranges Dec 13 14:29:43.063948 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Dec 13 14:29:43.063954 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] Dec 13 14:29:43.063961 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] Dec 13 14:29:43.063967 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] Dec 13 14:29:43.063974 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] Dec 13 14:29:43.063980 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] Dec 13 14:29:43.063986 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] Dec 13 14:29:43.063993 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:29:43.063999 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Dec 13 14:29:43.064006 kernel: On node 0, zone DMA: 8 pages in unavailable ranges Dec 13 14:29:43.064014 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:29:43.064020 kernel: On node 0, zone DMA: 240 pages in unavailable ranges Dec 13 14:29:43.064027 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Dec 13 14:29:43.064034 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges Dec 13 14:29:43.064040 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 14:29:43.064047 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:29:43.064053 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:29:43.064060 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 14:29:43.064067 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:29:43.064074 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:29:43.064081 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:29:43.064088 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:29:43.064097 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:29:43.064103 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 14:29:43.064110 kernel: TSC deadline timer available Dec 13 14:29:43.064116 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Dec 13 14:29:43.064125 kernel: kvm-guest: KVM setup pv remote TLB flush Dec 13 14:29:43.064132 kernel: kvm-guest: setup PV sched yield Dec 13 14:29:43.064155 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 14:29:43.064164 kernel: Booting paravirtualized kernel on KVM Dec 13 14:29:43.065359 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:29:43.065377 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Dec 13 14:29:43.065385 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Dec 13 14:29:43.065394 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Dec 13 14:29:43.065402 kernel: pcpu-alloc: [0] 0 1 2 3 Dec 13 14:29:43.065421 kernel: kvm-guest: setup async PF for cpu 0 Dec 13 14:29:43.065430 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 Dec 13 14:29:43.065439 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:29:43.065448 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:29:43.065456 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 Dec 13 14:29:43.065467 kernel: Policy zone: DMA32 Dec 13 14:29:43.065478 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:29:43.065487 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:29:43.065495 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:29:43.065505 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:29:43.065514 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:29:43.065523 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 169308K reserved, 0K cma-reserved) Dec 13 14:29:43.065531 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 14:29:43.065540 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:29:43.065548 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:29:43.065557 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:29:43.065566 kernel: rcu: RCU event tracing is enabled. Dec 13 14:29:43.065575 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 14:29:43.065585 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:29:43.065594 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:29:43.065602 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:29:43.065611 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 14:29:43.065619 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Dec 13 14:29:43.065627 kernel: Console: colour dummy device 80x25 Dec 13 14:29:43.065636 kernel: printk: console [ttyS0] enabled Dec 13 14:29:43.065644 kernel: ACPI: Core revision 20210730 Dec 13 14:29:43.065653 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Dec 13 14:29:43.065663 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:29:43.065671 kernel: x2apic enabled Dec 13 14:29:43.065680 kernel: Switched APIC routing to physical x2apic. Dec 13 14:29:43.065688 kernel: kvm-guest: setup PV IPIs Dec 13 14:29:43.065697 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 14:29:43.065705 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 14:29:43.065714 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Dec 13 14:29:43.065722 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 14:29:43.065730 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 13 14:29:43.065740 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 13 14:29:43.065749 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:29:43.065761 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:29:43.065770 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:29:43.065779 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:29:43.065787 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 13 14:29:43.065796 kernel: RETBleed: Mitigation: untrained return thunk Dec 13 14:29:43.065809 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:29:43.065818 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:29:43.065829 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:29:43.065837 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:29:43.065846 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:29:43.065854 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:29:43.065863 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 14:29:43.065871 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:29:43.065880 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:29:43.065888 kernel: LSM: Security Framework initializing Dec 13 14:29:43.065896 kernel: SELinux: Initializing. Dec 13 14:29:43.065906 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:29:43.065915 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:29:43.065923 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 13 14:29:43.065932 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 13 14:29:43.065940 kernel: ... version: 0 Dec 13 14:29:43.065948 kernel: ... bit width: 48 Dec 13 14:29:43.065957 kernel: ... generic registers: 6 Dec 13 14:29:43.065965 kernel: ... value mask: 0000ffffffffffff Dec 13 14:29:43.065973 kernel: ... max period: 00007fffffffffff Dec 13 14:29:43.065983 kernel: ... fixed-purpose events: 0 Dec 13 14:29:43.065992 kernel: ... event mask: 000000000000003f Dec 13 14:29:43.066001 kernel: signal: max sigframe size: 1776 Dec 13 14:29:43.066010 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:29:43.066018 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:29:43.066024 kernel: x86: Booting SMP configuration: Dec 13 14:29:43.066031 kernel: .... node #0, CPUs: #1 Dec 13 14:29:43.066038 kernel: kvm-clock: cpu 1, msr 3019a041, secondary cpu clock Dec 13 14:29:43.066045 kernel: kvm-guest: setup async PF for cpu 1 Dec 13 14:29:43.066054 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 Dec 13 14:29:43.066061 kernel: #2 Dec 13 14:29:43.066068 kernel: kvm-clock: cpu 2, msr 3019a081, secondary cpu clock Dec 13 14:29:43.066074 kernel: kvm-guest: setup async PF for cpu 2 Dec 13 14:29:43.066081 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 Dec 13 14:29:43.066088 kernel: #3 Dec 13 14:29:43.066095 kernel: kvm-clock: cpu 3, msr 3019a0c1, secondary cpu clock Dec 13 14:29:43.066102 kernel: kvm-guest: setup async PF for cpu 3 Dec 13 14:29:43.066109 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 Dec 13 14:29:43.066117 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 14:29:43.066124 kernel: smpboot: Max logical packages: 1 Dec 13 14:29:43.066131 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Dec 13 14:29:43.066170 kernel: devtmpfs: initialized Dec 13 14:29:43.066180 kernel: x86/mm: Memory block size: 128MB Dec 13 14:29:43.066187 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) Dec 13 14:29:43.066194 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) Dec 13 14:29:43.066202 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) Dec 13 14:29:43.066210 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) Dec 13 14:29:43.066222 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) Dec 13 14:29:43.066231 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:29:43.066239 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 14:29:43.066248 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:29:43.066256 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:29:43.066264 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:29:43.066273 kernel: audit: type=2000 audit(1734100182.553:1): state=initialized audit_enabled=0 res=1 Dec 13 14:29:43.066281 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:29:43.066309 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:29:43.066379 kernel: cpuidle: using governor menu Dec 13 14:29:43.066388 kernel: ACPI: bus type PCI registered Dec 13 14:29:43.066396 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:29:43.066405 kernel: dca service started, version 1.12.1 Dec 13 14:29:43.066424 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 14:29:43.066434 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 14:29:43.066443 kernel: PCI: Using configuration type 1 for base access Dec 13 14:29:43.066452 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:29:43.066461 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:29:43.066472 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:29:43.066480 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:29:43.066488 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:29:43.066497 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:29:43.066506 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:29:43.066514 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:29:43.066523 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:29:43.066531 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:29:43.066540 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:29:43.066551 kernel: ACPI: Interpreter enabled Dec 13 14:29:43.066559 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 14:29:43.066568 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:29:43.066577 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:29:43.066585 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 14:29:43.066594 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:29:43.066769 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:29:43.066868 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Dec 13 14:29:43.066985 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Dec 13 14:29:43.067000 kernel: PCI host bridge to bus 0000:00 Dec 13 14:29:43.067169 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:29:43.067270 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:29:43.067340 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:29:43.067410 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Dec 13 14:29:43.067499 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 14:29:43.067571 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] Dec 13 14:29:43.067637 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:29:43.067738 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 14:29:43.067832 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Dec 13 14:29:43.067910 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] Dec 13 14:29:43.067987 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] Dec 13 14:29:43.068063 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Dec 13 14:29:43.068153 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb Dec 13 14:29:43.068232 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:29:43.068327 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:29:43.068409 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] Dec 13 14:29:43.068510 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] Dec 13 14:29:43.068586 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] Dec 13 14:29:43.068678 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Dec 13 14:29:43.068755 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] Dec 13 14:29:43.068830 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] Dec 13 14:29:43.068905 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] Dec 13 14:29:43.069014 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 14:29:43.069093 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] Dec 13 14:29:43.069186 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] Dec 13 14:29:43.069269 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] Dec 13 14:29:43.069343 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] Dec 13 14:29:43.069452 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 14:29:43.069532 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 14:29:43.069621 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 14:29:43.069698 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] Dec 13 14:29:43.069771 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] Dec 13 14:29:43.069865 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 14:29:43.069942 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] Dec 13 14:29:43.069951 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:29:43.069959 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:29:43.069966 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:29:43.069974 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:29:43.069981 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 14:29:43.069991 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 14:29:43.069998 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 14:29:43.070005 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 14:29:43.070012 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 14:29:43.070019 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 14:29:43.070026 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 14:29:43.070033 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 14:29:43.070040 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 14:29:43.070047 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 14:29:43.070056 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 14:29:43.070063 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 14:29:43.070070 kernel: iommu: Default domain type: Translated Dec 13 14:29:43.070077 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:29:43.070167 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 14:29:43.070245 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:29:43.070336 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 14:29:43.070347 kernel: vgaarb: loaded Dec 13 14:29:43.070357 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:29:43.070369 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:29:43.070379 kernel: PTP clock support registered Dec 13 14:29:43.070387 kernel: Registered efivars operations Dec 13 14:29:43.070396 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:29:43.070405 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:29:43.070427 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] Dec 13 14:29:43.070440 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] Dec 13 14:29:43.070450 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] Dec 13 14:29:43.070459 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] Dec 13 14:29:43.070468 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] Dec 13 14:29:43.070476 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] Dec 13 14:29:43.070483 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Dec 13 14:29:43.070490 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Dec 13 14:29:43.070498 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:29:43.070505 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:29:43.070513 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:29:43.070520 kernel: pnp: PnP ACPI init Dec 13 14:29:43.070628 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 14:29:43.070643 kernel: pnp: PnP ACPI: found 6 devices Dec 13 14:29:43.070650 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:29:43.070658 kernel: NET: Registered PF_INET protocol family Dec 13 14:29:43.070666 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:29:43.070673 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:29:43.070680 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:29:43.070688 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:29:43.070695 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:29:43.070704 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:29:43.070711 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:29:43.070718 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:29:43.070726 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:29:43.070733 kernel: NET: Registered PF_XDP protocol family Dec 13 14:29:43.070812 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window Dec 13 14:29:43.070889 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] Dec 13 14:29:43.070959 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:29:43.071029 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:29:43.076377 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:29:43.076542 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Dec 13 14:29:43.076641 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 14:29:43.076739 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] Dec 13 14:29:43.076757 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:29:43.076764 kernel: Initialise system trusted keyrings Dec 13 14:29:43.076772 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:29:43.076780 kernel: Key type asymmetric registered Dec 13 14:29:43.076792 kernel: Asymmetric key parser 'x509' registered Dec 13 14:29:43.076813 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:29:43.076832 kernel: io scheduler mq-deadline registered Dec 13 14:29:43.076841 kernel: io scheduler kyber registered Dec 13 14:29:43.076849 kernel: io scheduler bfq registered Dec 13 14:29:43.076864 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:29:43.076878 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 14:29:43.076886 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 14:29:43.076894 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 14:29:43.076904 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:29:43.076911 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:29:43.076919 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:29:43.076927 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:29:43.076934 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:29:43.077058 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 14:29:43.077071 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:29:43.077169 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 14:29:43.077268 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T14:29:42 UTC (1734100182) Dec 13 14:29:43.077373 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Dec 13 14:29:43.077384 kernel: efifb: probing for efifb Dec 13 14:29:43.077394 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k Dec 13 14:29:43.077402 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 Dec 13 14:29:43.077410 kernel: efifb: scrolling: redraw Dec 13 14:29:43.077428 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 14:29:43.077435 kernel: Console: switching to colour frame buffer device 160x50 Dec 13 14:29:43.077443 kernel: fb0: EFI VGA frame buffer device Dec 13 14:29:43.077452 kernel: pstore: Registered efi as persistent store backend Dec 13 14:29:43.077460 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:29:43.077468 kernel: Segment Routing with IPv6 Dec 13 14:29:43.077477 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:29:43.077484 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:29:43.077509 kernel: Key type dns_resolver registered Dec 13 14:29:43.077517 kernel: IPI shorthand broadcast: enabled Dec 13 14:29:43.077524 kernel: sched_clock: Marking stable (498002289, 140889941)->(705098261, -66206031) Dec 13 14:29:43.077532 kernel: registered taskstats version 1 Dec 13 14:29:43.077539 kernel: Loading compiled-in X.509 certificates Dec 13 14:29:43.077547 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:29:43.077554 kernel: Key type .fscrypt registered Dec 13 14:29:43.077562 kernel: Key type fscrypt-provisioning registered Dec 13 14:29:43.077569 kernel: pstore: Using crash dump compression: deflate Dec 13 14:29:43.077579 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:29:43.077587 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:29:43.077594 kernel: ima: No architecture policies found Dec 13 14:29:43.077610 kernel: clk: Disabling unused clocks Dec 13 14:29:43.077623 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:29:43.077631 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:29:43.077638 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:29:43.077646 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:29:43.077653 kernel: Run /init as init process Dec 13 14:29:43.077663 kernel: with arguments: Dec 13 14:29:43.077671 kernel: /init Dec 13 14:29:43.077678 kernel: with environment: Dec 13 14:29:43.077685 kernel: HOME=/ Dec 13 14:29:43.077692 kernel: TERM=linux Dec 13 14:29:43.077700 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:29:43.077714 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:29:43.077732 systemd[1]: Detected virtualization kvm. Dec 13 14:29:43.077749 systemd[1]: Detected architecture x86-64. Dec 13 14:29:43.077757 systemd[1]: Running in initrd. Dec 13 14:29:43.077765 systemd[1]: No hostname configured, using default hostname. Dec 13 14:29:43.077772 systemd[1]: Hostname set to . Dec 13 14:29:43.077780 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:29:43.077788 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:29:43.077796 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:29:43.077804 systemd[1]: Reached target cryptsetup.target. Dec 13 14:29:43.077824 systemd[1]: Reached target paths.target. Dec 13 14:29:43.077832 systemd[1]: Reached target slices.target. Dec 13 14:29:43.077840 systemd[1]: Reached target swap.target. Dec 13 14:29:43.077852 systemd[1]: Reached target timers.target. Dec 13 14:29:43.077861 systemd[1]: Listening on iscsid.socket. Dec 13 14:29:43.077869 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:29:43.077877 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:29:43.077885 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:29:43.077905 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:29:43.077917 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:29:43.077926 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:29:43.077934 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:29:43.077942 systemd[1]: Reached target sockets.target. Dec 13 14:29:43.077950 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:29:43.077958 systemd[1]: Finished network-cleanup.service. Dec 13 14:29:43.077966 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:29:43.077974 systemd[1]: Starting systemd-journald.service... Dec 13 14:29:43.078000 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:29:43.078008 systemd[1]: Starting systemd-resolved.service... Dec 13 14:29:43.078016 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:29:43.078023 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:29:43.078031 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:29:43.078042 kernel: audit: type=1130 audit(1734100183.062:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.078064 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:29:43.078072 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:29:43.078092 systemd-journald[197]: Journal started Dec 13 14:29:43.078227 systemd-journald[197]: Runtime Journal (/run/log/journal/9731a5de3eb643f2885587fb56be6a8e) is 6.0M, max 48.4M, 42.4M free. Dec 13 14:29:43.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.076519 systemd-modules-load[198]: Inserted module 'overlay' Dec 13 14:29:43.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.084168 kernel: audit: type=1130 audit(1734100183.080:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.084194 systemd[1]: Started systemd-journald.service. Dec 13 14:29:43.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.086194 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:29:43.089169 kernel: audit: type=1130 audit(1734100183.085:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.091817 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:29:43.095895 kernel: audit: type=1130 audit(1734100183.090:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.104306 systemd-resolved[199]: Positive Trust Anchors: Dec 13 14:29:43.104327 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:29:43.104390 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:29:43.119479 systemd-resolved[199]: Defaulting to hostname 'linux'. Dec 13 14:29:43.121263 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:29:43.120357 systemd[1]: Started systemd-resolved.service. Dec 13 14:29:43.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.138296 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:29:43.143656 kernel: audit: type=1130 audit(1734100183.137:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.143684 kernel: Bridge firewalling registered Dec 13 14:29:43.143697 kernel: audit: type=1130 audit(1734100183.143:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.141716 systemd-modules-load[198]: Inserted module 'br_netfilter' Dec 13 14:29:43.143743 systemd[1]: Reached target nss-lookup.target. Dec 13 14:29:43.149904 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:29:43.160340 dracut-cmdline[216]: dracut-dracut-053 Dec 13 14:29:43.163769 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:29:43.169018 kernel: SCSI subsystem initialized Dec 13 14:29:43.177428 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:29:43.177475 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:29:43.178971 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:29:43.182091 systemd-modules-load[198]: Inserted module 'dm_multipath' Dec 13 14:29:43.182923 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:29:43.187783 kernel: audit: type=1130 audit(1734100183.183:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.184832 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:29:43.193804 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:29:43.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.199188 kernel: audit: type=1130 audit(1734100183.193:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.241211 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:29:43.258174 kernel: iscsi: registered transport (tcp) Dec 13 14:29:43.281192 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:29:43.281285 kernel: QLogic iSCSI HBA Driver Dec 13 14:29:43.320731 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:29:43.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.323617 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:29:43.327287 kernel: audit: type=1130 audit(1734100183.322:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.374179 kernel: raid6: avx2x4 gen() 20091 MB/s Dec 13 14:29:43.391159 kernel: raid6: avx2x4 xor() 6372 MB/s Dec 13 14:29:43.408194 kernel: raid6: avx2x2 gen() 19841 MB/s Dec 13 14:29:43.425205 kernel: raid6: avx2x2 xor() 13280 MB/s Dec 13 14:29:43.442185 kernel: raid6: avx2x1 gen() 21477 MB/s Dec 13 14:29:43.459179 kernel: raid6: avx2x1 xor() 13902 MB/s Dec 13 14:29:43.476171 kernel: raid6: sse2x4 gen() 13612 MB/s Dec 13 14:29:43.493159 kernel: raid6: sse2x4 xor() 7338 MB/s Dec 13 14:29:43.510162 kernel: raid6: sse2x2 gen() 16182 MB/s Dec 13 14:29:43.527160 kernel: raid6: sse2x2 xor() 9552 MB/s Dec 13 14:29:43.544173 kernel: raid6: sse2x1 gen() 11846 MB/s Dec 13 14:29:43.561571 kernel: raid6: sse2x1 xor() 7690 MB/s Dec 13 14:29:43.561592 kernel: raid6: using algorithm avx2x1 gen() 21477 MB/s Dec 13 14:29:43.561602 kernel: raid6: .... xor() 13902 MB/s, rmw enabled Dec 13 14:29:43.563163 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:29:43.575161 kernel: xor: automatically using best checksumming function avx Dec 13 14:29:43.673179 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:29:43.682169 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:29:43.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.684000 audit: BPF prog-id=7 op=LOAD Dec 13 14:29:43.684000 audit: BPF prog-id=8 op=LOAD Dec 13 14:29:43.685043 systemd[1]: Starting systemd-udevd.service... Dec 13 14:29:43.697818 systemd-udevd[400]: Using default interface naming scheme 'v252'. Dec 13 14:29:43.702461 systemd[1]: Started systemd-udevd.service. Dec 13 14:29:43.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.705556 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:29:43.718664 dracut-pre-trigger[409]: rd.md=0: removing MD RAID activation Dec 13 14:29:43.748212 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:29:43.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.750690 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:29:43.804585 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:29:43.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:43.838310 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 14:29:43.864288 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:29:43.864313 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:29:43.864323 kernel: GPT:9289727 != 19775487 Dec 13 14:29:43.864332 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:29:43.864340 kernel: GPT:9289727 != 19775487 Dec 13 14:29:43.864349 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:29:43.864357 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:29:43.864366 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:29:43.864374 kernel: AES CTR mode by8 optimization enabled Dec 13 14:29:43.866168 kernel: libata version 3.00 loaded. Dec 13 14:29:43.876777 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 14:29:43.883229 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 14:29:43.883246 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 14:29:43.883341 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 14:29:43.883434 kernel: scsi host0: ahci Dec 13 14:29:43.883554 kernel: scsi host1: ahci Dec 13 14:29:43.883644 kernel: scsi host2: ahci Dec 13 14:29:43.883737 kernel: scsi host3: ahci Dec 13 14:29:43.883833 kernel: scsi host4: ahci Dec 13 14:29:43.883923 kernel: scsi host5: ahci Dec 13 14:29:43.884031 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 Dec 13 14:29:43.884042 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 Dec 13 14:29:43.884051 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 Dec 13 14:29:43.884060 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 Dec 13 14:29:43.884071 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 Dec 13 14:29:43.884080 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 Dec 13 14:29:43.894922 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:29:43.902169 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (453) Dec 13 14:29:43.907314 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:29:43.915863 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:29:43.917115 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:29:43.923148 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:29:43.925171 systemd[1]: Starting disk-uuid.service... Dec 13 14:29:43.932342 disk-uuid[526]: Primary Header is updated. Dec 13 14:29:43.932342 disk-uuid[526]: Secondary Entries is updated. Dec 13 14:29:43.932342 disk-uuid[526]: Secondary Header is updated. Dec 13 14:29:43.936845 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:29:43.938171 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:29:44.198831 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 14:29:44.198930 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 14:29:44.198941 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 14:29:44.198950 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 14:29:44.200218 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 14:29:44.201165 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Dec 13 14:29:44.202794 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 13 14:29:44.202804 kernel: ata3.00: applying bridge limits Dec 13 14:29:44.204233 kernel: ata3.00: configured for UDMA/100 Dec 13 14:29:44.205195 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 13 14:29:44.238383 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 13 14:29:44.255897 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:29:44.255917 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 14:29:44.941644 disk-uuid[527]: The operation has completed successfully. Dec 13 14:29:44.942889 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:29:44.970562 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:29:44.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:44.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:44.970651 systemd[1]: Finished disk-uuid.service. Dec 13 14:29:44.975403 systemd[1]: Starting verity-setup.service... Dec 13 14:29:44.990178 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Dec 13 14:29:45.013741 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:29:45.017056 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:29:45.019669 systemd[1]: Finished verity-setup.service. Dec 13 14:29:45.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:45.081168 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:29:45.081192 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:29:45.082380 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:29:45.083102 systemd[1]: Starting ignition-setup.service... Dec 13 14:29:45.085380 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:29:45.093772 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:29:45.093803 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:29:45.093819 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:29:45.104290 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:29:45.113964 systemd[1]: Finished ignition-setup.service. Dec 13 14:29:45.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:45.116630 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:29:45.161495 ignition[646]: Ignition 2.14.0 Dec 13 14:29:45.161516 ignition[646]: Stage: fetch-offline Dec 13 14:29:45.161601 ignition[646]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:29:45.161617 ignition[646]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:29:45.161781 ignition[646]: parsed url from cmdline: "" Dec 13 14:29:45.161786 ignition[646]: no config URL provided Dec 13 14:29:45.161793 ignition[646]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:29:45.161805 ignition[646]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:29:45.161828 ignition[646]: op(1): [started] loading QEMU firmware config module Dec 13 14:29:45.161834 ignition[646]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 14:29:45.169312 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:29:45.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:45.172000 audit: BPF prog-id=9 op=LOAD Dec 13 14:29:45.172920 systemd[1]: Starting systemd-networkd.service... Dec 13 14:29:45.174077 ignition[646]: op(1): [finished] loading QEMU firmware config module Dec 13 14:29:45.222304 ignition[646]: parsing config with SHA512: 168bcb128908b8f719a4ece8772414957c96b9dc76cbde0bc1bb83609ed97f140d918a962b58e262d99a4cc60db93963c4924fad88a99dbea2d4a3f1b742b0cd Dec 13 14:29:45.228618 unknown[646]: fetched base config from "system" Dec 13 14:29:45.228630 unknown[646]: fetched user config from "qemu" Dec 13 14:29:45.229019 ignition[646]: fetch-offline: fetch-offline passed Dec 13 14:29:45.229064 ignition[646]: Ignition finished successfully Dec 13 14:29:45.233862 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:29:45.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:45.250838 systemd-networkd[722]: lo: Link UP Dec 13 14:29:45.250849 systemd-networkd[722]: lo: Gained carrier Dec 13 14:29:45.251422 systemd-networkd[722]: Enumeration completed Dec 13 14:29:45.251677 systemd-networkd[722]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:29:45.252910 systemd[1]: Started systemd-networkd.service. Dec 13 14:29:45.253457 systemd-networkd[722]: eth0: Link UP Dec 13 14:29:45.253461 systemd-networkd[722]: eth0: Gained carrier Dec 13 14:29:45.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:45.258236 systemd[1]: Reached target network.target. Dec 13 14:29:45.259797 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 14:29:45.262238 systemd[1]: Starting ignition-kargs.service... Dec 13 14:29:45.264625 systemd[1]: Starting iscsiuio.service... Dec 13 14:29:45.270376 systemd[1]: Started iscsiuio.service. Dec 13 14:29:45.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:45.271893 ignition[724]: Ignition 2.14.0 Dec 13 14:29:45.271902 ignition[724]: Stage: kargs Dec 13 14:29:45.272036 ignition[724]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:29:45.272046 ignition[724]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:29:45.273294 ignition[724]: kargs: kargs passed Dec 13 14:29:45.273337 ignition[724]: Ignition finished successfully Dec 13 14:29:45.276258 systemd[1]: Starting iscsid.service... Dec 13 14:29:45.276267 systemd-networkd[722]: eth0: DHCPv4 address 10.0.0.133/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 14:29:45.279703 iscsid[733]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:29:45.279703 iscsid[733]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:29:45.279703 iscsid[733]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:29:45.279703 iscsid[733]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:29:45.279703 iscsid[733]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:29:45.279703 iscsid[733]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:29:45.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:45.279793 systemd[1]: Finished ignition-kargs.service. Dec 13 14:29:45.288134 systemd[1]: Started iscsid.service. Dec 13 14:29:45.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:45.294385 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:29:45.296722 systemd[1]: Starting ignition-disks.service... Dec 13 14:29:45.304750 ignition[735]: Ignition 2.14.0 Dec 13 14:29:45.304764 ignition[735]: Stage: disks Dec 13 14:29:45.304870 ignition[735]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:29:45.304880 ignition[735]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:29:45.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:45.306933 systemd[1]: Finished ignition-disks.service. Dec 13 14:29:45.305983 ignition[735]: disks: disks passed Dec 13 14:29:45.307916 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:29:45.306025 ignition[735]: Ignition finished successfully Dec 13 14:29:45.311048 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:29:45.312754 systemd[1]: Reached target local-fs.target. Dec 13 14:29:45.313472 systemd[1]: Reached target sysinit.target. Dec 13 14:29:45.316016 systemd[1]: Reached target basic.target. Dec 13 14:29:45.322102 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:29:45.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:45.323961 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:29:45.324956 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:29:45.325001 systemd[1]: Reached target remote-fs.target. Dec 13 14:29:45.328539 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:29:45.338356 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:29:45.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:45.339067 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:29:45.349626 systemd-fsck[755]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 14:29:45.453104 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:29:45.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:45.453947 systemd[1]: Mounting sysroot.mount... Dec 13 14:29:45.461189 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:29:45.461677 systemd[1]: Mounted sysroot.mount. Dec 13 14:29:45.462480 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:29:45.465147 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:29:45.466503 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:29:45.466536 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:29:45.466557 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:29:45.468788 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:29:45.471203 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:29:45.476324 initrd-setup-root[765]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:29:45.479268 initrd-setup-root[773]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:29:45.482164 initrd-setup-root[781]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:29:45.485941 initrd-setup-root[789]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:29:45.512112 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:29:45.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:45.513836 systemd[1]: Starting ignition-mount.service... Dec 13 14:29:45.514504 systemd[1]: Starting sysroot-boot.service... Dec 13 14:29:45.521818 bash[807]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 14:29:45.529478 systemd[1]: Finished sysroot-boot.service. Dec 13 14:29:45.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:45.531439 ignition[808]: INFO : Ignition 2.14.0 Dec 13 14:29:45.531439 ignition[808]: INFO : Stage: mount Dec 13 14:29:45.533054 ignition[808]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:29:45.533054 ignition[808]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:29:45.535887 ignition[808]: INFO : mount: mount passed Dec 13 14:29:45.536677 ignition[808]: INFO : Ignition finished successfully Dec 13 14:29:45.538003 systemd[1]: Finished ignition-mount.service. Dec 13 14:29:45.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:46.028232 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:29:46.034165 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (816) Dec 13 14:29:46.036535 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:29:46.036593 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:29:46.036610 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:29:46.041023 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:29:46.042699 systemd[1]: Starting ignition-files.service... Dec 13 14:29:46.056532 ignition[836]: INFO : Ignition 2.14.0 Dec 13 14:29:46.056532 ignition[836]: INFO : Stage: files Dec 13 14:29:46.058198 ignition[836]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:29:46.058198 ignition[836]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:29:46.061510 ignition[836]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:29:46.063048 ignition[836]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:29:46.063048 ignition[836]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:29:46.073367 ignition[836]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:29:46.074940 ignition[836]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:29:46.076791 unknown[836]: wrote ssh authorized keys file for user: core Dec 13 14:29:46.077965 ignition[836]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:29:46.077965 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:29:46.077965 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 14:29:46.118443 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 14:29:46.211862 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:29:46.211862 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:29:46.216287 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:29:46.216287 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:29:46.216287 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:29:46.216287 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:29:46.216287 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:29:46.216287 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:29:46.216287 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:29:46.216287 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:29:46.216287 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:29:46.216287 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:29:46.216287 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:29:46.216287 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:29:46.216287 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 13 14:29:46.739223 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 14:29:47.033614 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:29:47.033614 ignition[836]: INFO : files: op(b): [started] processing unit "prepare-helm.service" Dec 13 14:29:47.038426 ignition[836]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:29:47.038426 ignition[836]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:29:47.038426 ignition[836]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" Dec 13 14:29:47.038426 ignition[836]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Dec 13 14:29:47.038426 ignition[836]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:29:47.038426 ignition[836]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:29:47.038426 ignition[836]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Dec 13 14:29:47.038426 ignition[836]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:29:47.038426 ignition[836]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:29:47.038426 ignition[836]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 14:29:47.038426 ignition[836]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:29:47.072097 ignition[836]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:29:47.073665 ignition[836]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 14:29:47.073665 ignition[836]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:29:47.073665 ignition[836]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:29:47.073665 ignition[836]: INFO : files: files passed Dec 13 14:29:47.073665 ignition[836]: INFO : Ignition finished successfully Dec 13 14:29:47.080515 systemd[1]: Finished ignition-files.service. Dec 13 14:29:47.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.082461 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:29:47.082587 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:29:47.084428 systemd[1]: Starting ignition-quench.service... Dec 13 14:29:47.089615 initrd-setup-root-after-ignition[860]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 14:29:47.091196 initrd-setup-root-after-ignition[862]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:29:47.091172 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:29:47.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.094820 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:29:47.095803 systemd[1]: Finished ignition-quench.service. Dec 13 14:29:47.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.097513 systemd[1]: Reached target ignition-complete.target. Dec 13 14:29:47.099959 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:29:47.110233 systemd-networkd[722]: eth0: Gained IPv6LL Dec 13 14:29:47.113663 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:29:47.114643 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:29:47.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.116310 systemd[1]: Reached target initrd-fs.target. Dec 13 14:29:47.117840 systemd[1]: Reached target initrd.target. Dec 13 14:29:47.119526 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:29:47.121519 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:29:47.132879 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:29:47.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.135220 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:29:47.143848 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:29:47.145520 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:29:47.147369 systemd[1]: Stopped target timers.target. Dec 13 14:29:47.148941 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:29:47.149942 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:29:47.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.151682 systemd[1]: Stopped target initrd.target. Dec 13 14:29:47.153206 systemd[1]: Stopped target basic.target. Dec 13 14:29:47.154743 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:29:47.156523 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:29:47.158318 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:29:47.160118 systemd[1]: Stopped target remote-fs.target. Dec 13 14:29:47.161741 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:29:47.163453 systemd[1]: Stopped target sysinit.target. Dec 13 14:29:47.165014 systemd[1]: Stopped target local-fs.target. Dec 13 14:29:47.166610 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:29:47.168266 systemd[1]: Stopped target swap.target. Dec 13 14:29:47.169722 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:29:47.170751 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:29:47.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.172445 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:29:47.177866 kernel: kauditd_printk_skb: 32 callbacks suppressed Dec 13 14:29:47.177889 kernel: audit: type=1131 audit(1734100187.172:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.177899 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:29:47.178945 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:29:47.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.180627 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:29:47.184737 kernel: audit: type=1131 audit(1734100187.180:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.180720 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:29:47.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.186539 systemd[1]: Stopped target paths.target. Dec 13 14:29:47.190951 kernel: audit: type=1131 audit(1734100187.186:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.190970 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:29:47.192155 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:29:47.193975 systemd[1]: Stopped target slices.target. Dec 13 14:29:47.195573 systemd[1]: Stopped target sockets.target. Dec 13 14:29:47.197203 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:29:47.198061 systemd[1]: Closed iscsid.socket. Dec 13 14:29:47.199534 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:29:47.200401 systemd[1]: Closed iscsiuio.socket. Dec 13 14:29:47.201819 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:29:47.202955 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:29:47.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.205020 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:29:47.209370 kernel: audit: type=1131 audit(1734100187.204:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.205105 systemd[1]: Stopped ignition-files.service. Dec 13 14:29:47.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.211868 systemd[1]: Stopping ignition-mount.service... Dec 13 14:29:47.215425 kernel: audit: type=1131 audit(1734100187.210:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.215350 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:29:47.215459 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:29:47.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.218767 ignition[876]: INFO : Ignition 2.14.0 Dec 13 14:29:47.218767 ignition[876]: INFO : Stage: umount Dec 13 14:29:47.218767 ignition[876]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:29:47.218767 ignition[876]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:29:47.226354 kernel: audit: type=1131 audit(1734100187.217:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.218747 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:29:47.231241 kernel: audit: type=1131 audit(1734100187.226:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.231300 ignition[876]: INFO : umount: umount passed Dec 13 14:29:47.231300 ignition[876]: INFO : Ignition finished successfully Dec 13 14:29:47.236178 kernel: audit: type=1131 audit(1734100187.231:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.224273 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:29:47.240880 kernel: audit: type=1131 audit(1734100187.236:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.224459 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:29:47.226480 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:29:47.247794 kernel: audit: type=1130 audit(1734100187.242:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.226566 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:29:47.234866 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:29:47.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.235577 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:29:47.235666 systemd[1]: Stopped ignition-mount.service. Dec 13 14:29:47.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.240962 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:29:47.241049 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:29:47.243197 systemd[1]: Stopped target network.target. Dec 13 14:29:47.247841 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:29:47.247915 systemd[1]: Stopped ignition-disks.service. Dec 13 14:29:47.249617 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:29:47.249666 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:29:47.251243 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:29:47.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.251293 systemd[1]: Stopped ignition-setup.service. Dec 13 14:29:47.253272 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:29:47.254744 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:29:47.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.259186 systemd-networkd[722]: eth0: DHCPv6 lease lost Dec 13 14:29:47.271000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:29:47.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.261307 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:29:47.261427 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:29:47.264122 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:29:47.277000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:29:47.264234 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:29:47.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.266589 systemd[1]: Stopping network-cleanup.service... Dec 13 14:29:47.267330 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:29:47.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.267373 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:29:47.267478 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:29:47.267508 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:29:47.269085 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:29:47.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.269124 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:29:47.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.270726 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:29:47.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.272564 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:29:47.272925 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:29:47.273008 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:29:47.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.278155 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:29:47.278265 systemd[1]: Stopped network-cleanup.service. Dec 13 14:29:47.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.280113 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:29:47.280242 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:29:47.283005 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:29:47.283040 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:29:47.284794 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:29:47.284842 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:29:47.286473 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:29:47.286523 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:29:47.288092 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:29:47.288131 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:29:47.289861 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:29:47.289914 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:29:47.292469 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:29:47.294419 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:29:47.294489 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:29:47.297965 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:29:47.298078 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:29:47.323598 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:29:47.323743 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:29:47.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.325709 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:29:47.327169 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:29:47.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:47.327220 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:29:47.329970 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:29:47.346878 systemd[1]: Switching root. Dec 13 14:29:47.369166 iscsid[733]: iscsid shutting down. Dec 13 14:29:47.370148 systemd-journald[197]: Received SIGTERM from PID 1 (n/a). Dec 13 14:29:47.370202 systemd-journald[197]: Journal stopped Dec 13 14:29:50.034056 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:29:50.034108 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:29:50.034119 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:29:50.034129 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:29:50.034163 kernel: SELinux: policy capability open_perms=1 Dec 13 14:29:50.034174 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:29:50.034183 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:29:50.034193 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:29:50.034208 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:29:50.034221 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:29:50.034232 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:29:50.034243 systemd[1]: Successfully loaded SELinux policy in 39.930ms. Dec 13 14:29:50.034267 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.288ms. Dec 13 14:29:50.034279 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:29:50.034290 systemd[1]: Detected virtualization kvm. Dec 13 14:29:50.034300 systemd[1]: Detected architecture x86-64. Dec 13 14:29:50.034310 systemd[1]: Detected first boot. Dec 13 14:29:50.034323 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:29:50.034333 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:29:50.034343 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:29:50.034353 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:29:50.034365 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:29:50.034378 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:29:50.034391 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:29:50.034402 systemd[1]: Stopped iscsiuio.service. Dec 13 14:29:50.034412 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:29:50.034426 systemd[1]: Stopped iscsid.service. Dec 13 14:29:50.034444 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:29:50.034459 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:29:50.034475 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:29:50.034492 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:29:50.034506 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:29:50.034516 systemd[1]: Created slice system-getty.slice. Dec 13 14:29:50.034527 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:29:50.034541 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:29:50.034554 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:29:50.034567 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:29:50.034580 systemd[1]: Created slice user.slice. Dec 13 14:29:50.034593 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:29:50.034606 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:29:50.034622 systemd[1]: Set up automount boot.automount. Dec 13 14:29:50.034635 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:29:50.034652 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:29:50.034665 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:29:50.034678 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:29:50.034692 systemd[1]: Reached target integritysetup.target. Dec 13 14:29:50.034705 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:29:50.034718 systemd[1]: Reached target remote-fs.target. Dec 13 14:29:50.034734 systemd[1]: Reached target slices.target. Dec 13 14:29:50.034748 systemd[1]: Reached target swap.target. Dec 13 14:29:50.034763 systemd[1]: Reached target torcx.target. Dec 13 14:29:50.034776 systemd[1]: Reached target veritysetup.target. Dec 13 14:29:50.034789 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:29:50.034802 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:29:50.034815 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:29:50.034828 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:29:50.034841 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:29:50.034854 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:29:50.034878 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:29:50.034891 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:29:50.034904 systemd[1]: Mounting media.mount... Dec 13 14:29:50.034917 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:29:50.034930 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:29:50.034943 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:29:50.034956 systemd[1]: Mounting tmp.mount... Dec 13 14:29:50.034974 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:29:50.034986 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:29:50.034999 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:29:50.035009 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:29:50.035019 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:29:50.035030 systemd[1]: Starting modprobe@drm.service... Dec 13 14:29:50.035042 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:29:50.035053 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:29:50.035063 systemd[1]: Starting modprobe@loop.service... Dec 13 14:29:50.035074 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:29:50.035086 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:29:50.035096 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:29:50.035106 kernel: loop: module loaded Dec 13 14:29:50.035117 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:29:50.035127 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:29:50.035149 kernel: fuse: init (API version 7.34) Dec 13 14:29:50.035159 systemd[1]: Stopped systemd-journald.service. Dec 13 14:29:50.035169 systemd[1]: Starting systemd-journald.service... Dec 13 14:29:50.035183 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:29:50.035196 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:29:50.035212 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:29:50.035225 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:29:50.035241 systemd-journald[994]: Journal started Dec 13 14:29:50.035297 systemd-journald[994]: Runtime Journal (/run/log/journal/9731a5de3eb643f2885587fb56be6a8e) is 6.0M, max 48.4M, 42.4M free. Dec 13 14:29:47.432000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:29:47.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:29:47.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:29:47.631000 audit: BPF prog-id=10 op=LOAD Dec 13 14:29:47.631000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:29:47.631000 audit: BPF prog-id=11 op=LOAD Dec 13 14:29:47.631000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:29:47.663000 audit[909]: AVC avc: denied { associate } for pid=909 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:29:47.663000 audit[909]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:47.663000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:29:47.664000 audit[909]: AVC avc: denied { associate } for pid=909 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:29:47.664000 audit[909]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859b9 a2=1ed a3=0 items=2 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:47.664000 audit: CWD cwd="/" Dec 13 14:29:47.664000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:47.664000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:47.664000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:29:49.893000 audit: BPF prog-id=12 op=LOAD Dec 13 14:29:49.893000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:29:49.894000 audit: BPF prog-id=13 op=LOAD Dec 13 14:29:49.894000 audit: BPF prog-id=14 op=LOAD Dec 13 14:29:49.894000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:29:49.894000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:29:49.894000 audit: BPF prog-id=15 op=LOAD Dec 13 14:29:49.894000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:29:49.894000 audit: BPF prog-id=16 op=LOAD Dec 13 14:29:49.894000 audit: BPF prog-id=17 op=LOAD Dec 13 14:29:49.894000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:29:49.894000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:29:49.895000 audit: BPF prog-id=18 op=LOAD Dec 13 14:29:49.895000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:29:49.895000 audit: BPF prog-id=19 op=LOAD Dec 13 14:29:49.895000 audit: BPF prog-id=20 op=LOAD Dec 13 14:29:49.895000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:29:49.895000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:29:49.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:49.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:49.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:49.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:49.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:49.907000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:29:50.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.017000 audit: BPF prog-id=21 op=LOAD Dec 13 14:29:50.018000 audit: BPF prog-id=22 op=LOAD Dec 13 14:29:50.018000 audit: BPF prog-id=23 op=LOAD Dec 13 14:29:50.018000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:29:50.018000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:29:50.032000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:29:50.032000 audit[994]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7fff7bb27120 a2=4000 a3=7fff7bb271bc items=0 ppid=1 pid=994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:50.032000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:29:47.661716 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:29:49.891757 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:29:47.661940 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:29:49.891768 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 14:29:47.661961 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:29:49.896469 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:29:47.661994 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:47Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:29:47.662005 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:47Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:29:47.662041 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:47Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:29:47.662056 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:47Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:29:47.662271 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:47Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:29:47.662321 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:47Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:29:50.037448 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:29:50.037472 systemd[1]: Stopped verity-setup.service. Dec 13 14:29:47.662333 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:47Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:29:47.662644 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:29:47.662703 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:47Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:29:47.662726 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:29:47.662743 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:47Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:29:47.662762 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:29:47.662777 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:47Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:29:49.598623 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:49Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:29:49.599087 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:49Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:29:49.599215 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:49Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:29:49.599381 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:49Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:29:49.599427 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:49Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:29:49.599482 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-12-13T14:29:49Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:29:50.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.041176 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:29:50.044290 systemd[1]: Started systemd-journald.service. Dec 13 14:29:50.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.045040 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:29:50.045959 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:29:50.046850 systemd[1]: Mounted media.mount. Dec 13 14:29:50.047680 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:29:50.048597 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:29:50.049646 systemd[1]: Mounted tmp.mount. Dec 13 14:29:50.050715 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:29:50.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.051991 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:29:50.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.053179 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:29:50.053441 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:29:50.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.054759 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:29:50.054987 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:29:50.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.056428 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:29:50.056635 systemd[1]: Finished modprobe@drm.service. Dec 13 14:29:50.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.057841 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:29:50.058044 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:29:50.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.059227 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:29:50.059444 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:29:50.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.060838 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:29:50.061022 systemd[1]: Finished modprobe@loop.service. Dec 13 14:29:50.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.062302 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:29:50.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.063672 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:29:50.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.065130 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:29:50.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.066566 systemd[1]: Reached target network-pre.target. Dec 13 14:29:50.069635 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:29:50.072033 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:29:50.072998 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:29:50.074851 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:29:50.076915 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:29:50.078493 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:29:50.079695 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:29:50.081025 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:29:50.082313 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:29:50.083317 systemd-journald[994]: Time spent on flushing to /var/log/journal/9731a5de3eb643f2885587fb56be6a8e is 24.754ms for 1165 entries. Dec 13 14:29:50.083317 systemd-journald[994]: System Journal (/var/log/journal/9731a5de3eb643f2885587fb56be6a8e) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:29:50.124374 systemd-journald[994]: Received client request to flush runtime journal. Dec 13 14:29:50.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.084439 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:29:50.088747 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:29:50.090082 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:29:50.125081 udevadm[1013]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 14:29:50.091351 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:29:50.092591 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:29:50.093673 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:29:50.095825 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:29:50.104583 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:29:50.105839 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:29:50.125457 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:29:50.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.604595 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:29:50.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.606000 audit: BPF prog-id=24 op=LOAD Dec 13 14:29:50.606000 audit: BPF prog-id=25 op=LOAD Dec 13 14:29:50.606000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:29:50.606000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:29:50.606983 systemd[1]: Starting systemd-udevd.service... Dec 13 14:29:50.622339 systemd-udevd[1015]: Using default interface naming scheme 'v252'. Dec 13 14:29:50.634963 systemd[1]: Started systemd-udevd.service. Dec 13 14:29:50.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.636000 audit: BPF prog-id=26 op=LOAD Dec 13 14:29:50.638614 systemd[1]: Starting systemd-networkd.service... Dec 13 14:29:50.643000 audit: BPF prog-id=27 op=LOAD Dec 13 14:29:50.643000 audit: BPF prog-id=28 op=LOAD Dec 13 14:29:50.643000 audit: BPF prog-id=29 op=LOAD Dec 13 14:29:50.644381 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:29:50.658296 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:29:50.685648 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:29:50.687715 systemd[1]: Started systemd-userdbd.service. Dec 13 14:29:50.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.697197 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:29:50.703167 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:29:50.715000 audit[1032]: AVC avc: denied { confidentiality } for pid=1032 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:29:50.715000 audit[1032]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c23ddbfb10 a1=337fc a2=7fb3cd44bbc5 a3=5 items=110 ppid=1015 pid=1032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:50.715000 audit: CWD cwd="/" Dec 13 14:29:50.715000 audit: PATH item=0 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=1 name=(null) inode=11199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=2 name=(null) inode=11199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=3 name=(null) inode=11200 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=4 name=(null) inode=11199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=5 name=(null) inode=11201 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=6 name=(null) inode=11199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=7 name=(null) inode=11202 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=8 name=(null) inode=11202 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=9 name=(null) inode=11203 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=10 name=(null) inode=11202 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=11 name=(null) inode=11204 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=12 name=(null) inode=11202 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=13 name=(null) inode=11205 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=14 name=(null) inode=11202 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=15 name=(null) inode=11206 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=16 name=(null) inode=11202 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=17 name=(null) inode=11207 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=18 name=(null) inode=11199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=19 name=(null) inode=11208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=20 name=(null) inode=11208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=21 name=(null) inode=11209 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=22 name=(null) inode=11208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=23 name=(null) inode=11210 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=24 name=(null) inode=11208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=25 name=(null) inode=11211 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=26 name=(null) inode=11208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=27 name=(null) inode=11212 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=28 name=(null) inode=11208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=29 name=(null) inode=11213 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=30 name=(null) inode=11199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=31 name=(null) inode=11214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=32 name=(null) inode=11214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=33 name=(null) inode=11215 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=34 name=(null) inode=11214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=35 name=(null) inode=11216 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=36 name=(null) inode=11214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=37 name=(null) inode=11217 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=38 name=(null) inode=11214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=39 name=(null) inode=11218 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=40 name=(null) inode=11214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=41 name=(null) inode=11219 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=42 name=(null) inode=11199 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=43 name=(null) inode=11220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=44 name=(null) inode=11220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=45 name=(null) inode=11221 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=46 name=(null) inode=11220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=47 name=(null) inode=11222 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=48 name=(null) inode=11220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=49 name=(null) inode=11223 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=50 name=(null) inode=11220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=51 name=(null) inode=11224 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=52 name=(null) inode=11220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=53 name=(null) inode=11225 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=54 name=(null) inode=51 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=55 name=(null) inode=11226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=56 name=(null) inode=11226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=57 name=(null) inode=11227 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=58 name=(null) inode=11226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=59 name=(null) inode=11228 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=60 name=(null) inode=11226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=61 name=(null) inode=11229 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=62 name=(null) inode=11229 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=63 name=(null) inode=11230 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=64 name=(null) inode=11229 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=65 name=(null) inode=11231 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=66 name=(null) inode=11229 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=67 name=(null) inode=11232 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=68 name=(null) inode=11229 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=69 name=(null) inode=11233 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=70 name=(null) inode=11229 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=71 name=(null) inode=11234 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=72 name=(null) inode=11226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=73 name=(null) inode=11235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=74 name=(null) inode=11235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=75 name=(null) inode=11236 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=76 name=(null) inode=11235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=77 name=(null) inode=11237 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=78 name=(null) inode=11235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=79 name=(null) inode=11238 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=80 name=(null) inode=11235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=81 name=(null) inode=11239 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=82 name=(null) inode=11235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=83 name=(null) inode=11240 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=84 name=(null) inode=11226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=85 name=(null) inode=11241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=86 name=(null) inode=11241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=87 name=(null) inode=11242 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=88 name=(null) inode=11241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=89 name=(null) inode=11243 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=90 name=(null) inode=11241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=91 name=(null) inode=11244 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=92 name=(null) inode=11241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=93 name=(null) inode=11245 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=94 name=(null) inode=11241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=95 name=(null) inode=11246 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=96 name=(null) inode=11226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=97 name=(null) inode=11247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=98 name=(null) inode=11247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=99 name=(null) inode=11248 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=100 name=(null) inode=11247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=101 name=(null) inode=11249 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=102 name=(null) inode=11247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=103 name=(null) inode=11250 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=104 name=(null) inode=11247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=105 name=(null) inode=11251 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=106 name=(null) inode=11247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=107 name=(null) inode=11252 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PATH item=109 name=(null) inode=11253 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:29:50.715000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:29:50.733153 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 14:29:50.740708 systemd-networkd[1025]: lo: Link UP Dec 13 14:29:50.740718 systemd-networkd[1025]: lo: Gained carrier Dec 13 14:29:50.741107 systemd-networkd[1025]: Enumeration completed Dec 13 14:29:50.741224 systemd[1]: Started systemd-networkd.service. Dec 13 14:29:50.741306 systemd-networkd[1025]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:29:50.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.742691 systemd-networkd[1025]: eth0: Link UP Dec 13 14:29:50.742700 systemd-networkd[1025]: eth0: Gained carrier Dec 13 14:29:50.753541 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device Dec 13 14:29:50.759789 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 14:29:50.759943 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:29:50.759962 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 14:29:50.760080 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 14:29:50.757304 systemd-networkd[1025]: eth0: DHCPv4 address 10.0.0.133/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 14:29:50.799724 kernel: kvm: Nested Virtualization enabled Dec 13 14:29:50.799770 kernel: SVM: kvm: Nested Paging enabled Dec 13 14:29:50.799798 kernel: SVM: Virtual VMLOAD VMSAVE supported Dec 13 14:29:50.800425 kernel: SVM: Virtual GIF supported Dec 13 14:29:50.814265 kernel: EDAC MC: Ver: 3.0.0 Dec 13 14:29:50.841596 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:29:50.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.843936 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:29:50.851101 lvm[1051]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:29:50.876845 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:29:50.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.877935 systemd[1]: Reached target cryptsetup.target. Dec 13 14:29:50.879890 systemd[1]: Starting lvm2-activation.service... Dec 13 14:29:50.883177 lvm[1052]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:29:50.910759 systemd[1]: Finished lvm2-activation.service. Dec 13 14:29:50.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.911683 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:29:50.912527 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:29:50.912547 systemd[1]: Reached target local-fs.target. Dec 13 14:29:50.913336 systemd[1]: Reached target machines.target. Dec 13 14:29:50.915028 systemd[1]: Starting ldconfig.service... Dec 13 14:29:50.916033 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:29:50.916085 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:29:50.916982 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:29:50.918831 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:29:50.921529 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:29:50.923656 systemd[1]: Starting systemd-sysext.service... Dec 13 14:29:50.925116 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1054 (bootctl) Dec 13 14:29:50.926370 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:29:50.932192 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:29:50.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.933851 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:29:50.936302 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:29:50.936488 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:29:50.946181 kernel: loop0: detected capacity change from 0 to 205544 Dec 13 14:29:50.962792 systemd-fsck[1063]: fsck.fat 4.2 (2021-01-31) Dec 13 14:29:50.962792 systemd-fsck[1063]: /dev/vda1: 790 files, 119311/258078 clusters Dec 13 14:29:50.964878 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:29:50.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:50.968110 systemd[1]: Mounting boot.mount... Dec 13 14:29:50.976937 systemd[1]: Mounted boot.mount. Dec 13 14:29:51.278166 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:29:51.281211 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:29:51.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:51.292513 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:29:51.293115 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:29:51.295173 kernel: loop1: detected capacity change from 0 to 205544 Dec 13 14:29:51.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:51.300966 (sd-sysext)[1067]: Using extensions 'kubernetes'. Dec 13 14:29:51.301518 (sd-sysext)[1067]: Merged extensions into '/usr'. Dec 13 14:29:51.318476 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:29:51.320034 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:29:51.321041 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:29:51.322542 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:29:51.324520 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:29:51.327765 systemd[1]: Starting modprobe@loop.service... Dec 13 14:29:51.328847 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:29:51.329028 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:29:51.329178 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:29:51.331817 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:29:51.333078 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:29:51.333277 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:29:51.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:51.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:51.334568 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:29:51.334688 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:29:51.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:51.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:51.335907 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:29:51.336022 systemd[1]: Finished modprobe@loop.service. Dec 13 14:29:51.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:51.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:51.337547 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:29:51.337665 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:29:51.338735 systemd[1]: Finished systemd-sysext.service. Dec 13 14:29:51.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:51.341272 systemd[1]: Starting ensure-sysext.service... Dec 13 14:29:51.343401 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:29:51.350388 systemd[1]: Reloading. Dec 13 14:29:51.356326 systemd-tmpfiles[1075]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:29:51.358060 systemd-tmpfiles[1075]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:29:51.358357 ldconfig[1053]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:29:51.362154 systemd-tmpfiles[1075]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:29:51.407649 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-12-13T14:29:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:29:51.407673 /usr/lib/systemd/system-generators/torcx-generator[1098]: time="2024-12-13T14:29:51Z" level=info msg="torcx already run" Dec 13 14:29:51.464288 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:29:51.464303 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:29:51.481680 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:29:51.534000 audit: BPF prog-id=30 op=LOAD Dec 13 14:29:51.534000 audit: BPF prog-id=31 op=LOAD Dec 13 14:29:51.534000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:29:51.534000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:29:51.535000 audit: BPF prog-id=32 op=LOAD Dec 13 14:29:51.535000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:29:51.535000 audit: BPF prog-id=33 op=LOAD Dec 13 14:29:51.536000 audit: BPF prog-id=34 op=LOAD Dec 13 14:29:51.536000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:29:51.536000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:29:51.537000 audit: BPF prog-id=35 op=LOAD Dec 13 14:29:51.537000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:29:51.538000 audit: BPF prog-id=36 op=LOAD Dec 13 14:29:51.538000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:29:51.538000 audit: BPF prog-id=37 op=LOAD Dec 13 14:29:51.538000 audit: BPF prog-id=38 op=LOAD Dec 13 14:29:51.538000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:29:51.538000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:29:51.541127 systemd[1]: Finished ldconfig.service. Dec 13 14:29:51.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:51.543086 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:29:51.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:51.547040 systemd[1]: Starting audit-rules.service... Dec 13 14:29:51.549067 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:29:51.551031 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:29:51.552000 audit: BPF prog-id=39 op=LOAD Dec 13 14:29:51.555000 audit: BPF prog-id=40 op=LOAD Dec 13 14:29:51.553634 systemd[1]: Starting systemd-resolved.service... Dec 13 14:29:51.555969 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:29:51.557946 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:29:51.559483 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:29:51.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:51.561000 audit[1151]: SYSTEM_BOOT pid=1151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:29:51.564890 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:29:51.568834 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:29:51.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:51.571420 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:29:51.571608 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:29:51.572968 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:29:51.574950 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:29:51.576739 systemd[1]: Starting modprobe@loop.service... Dec 13 14:29:51.577680 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:29:51.577787 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:29:51.577872 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:29:51.577942 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:29:51.578801 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:29:51.579277 augenrules[1162]: No rules Dec 13 14:29:51.578000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:29:51.578000 audit[1162]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffddf4346e0 a2=420 a3=0 items=0 ppid=1139 pid=1162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:51.578000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:29:51.580468 systemd[1]: Finished audit-rules.service. Dec 13 14:29:51.581665 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:29:51.581780 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:29:51.582986 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:29:51.583083 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:29:51.584490 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:29:51.584607 systemd[1]: Finished modprobe@loop.service. Dec 13 14:29:51.585904 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:29:51.585996 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:29:51.587302 systemd[1]: Starting systemd-update-done.service... Dec 13 14:29:51.590422 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:29:51.590614 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:29:51.592244 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:29:51.600070 systemd[1]: Starting modprobe@drm.service... Dec 13 14:29:51.602248 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:29:51.604266 systemd[1]: Starting modprobe@loop.service... Dec 13 14:29:51.605205 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:29:51.605321 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:29:51.606386 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:29:51.607512 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:29:51.607604 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:29:51.608614 systemd[1]: Finished systemd-update-done.service. Dec 13 14:29:51.610030 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:29:51.610158 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:29:51.614830 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:29:51.614964 systemd[1]: Finished modprobe@drm.service. Dec 13 14:29:51.615305 systemd-resolved[1146]: Positive Trust Anchors: Dec 13 14:29:51.615322 systemd-resolved[1146]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:29:51.615349 systemd-resolved[1146]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:29:51.616476 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:29:51.616581 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:29:51.617926 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:29:51.618034 systemd[1]: Finished modprobe@loop.service. Dec 13 14:29:51.619743 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:29:51.619830 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:29:51.620724 systemd[1]: Finished ensure-sysext.service. Dec 13 14:29:52.219642 systemd-timesyncd[1149]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 14:29:52.219678 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:29:52.219911 systemd-resolved[1146]: Defaulting to hostname 'linux'. Dec 13 14:29:52.220036 systemd-timesyncd[1149]: Initial clock synchronization to Fri 2024-12-13 14:29:52.219576 UTC. Dec 13 14:29:52.221458 systemd[1]: Started systemd-resolved.service. Dec 13 14:29:52.222534 systemd[1]: Reached target network.target. Dec 13 14:29:52.223492 systemd[1]: Reached target nss-lookup.target. Dec 13 14:29:52.224410 systemd[1]: Reached target sysinit.target. Dec 13 14:29:52.225302 systemd[1]: Started motdgen.path. Dec 13 14:29:52.226188 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:29:52.227348 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:29:52.228267 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:29:52.228289 systemd[1]: Reached target paths.target. Dec 13 14:29:52.229106 systemd[1]: Reached target time-set.target. Dec 13 14:29:52.230064 systemd[1]: Started logrotate.timer. Dec 13 14:29:52.230904 systemd[1]: Started mdadm.timer. Dec 13 14:29:52.231635 systemd[1]: Reached target timers.target. Dec 13 14:29:52.232720 systemd[1]: Listening on dbus.socket. Dec 13 14:29:52.234358 systemd[1]: Starting docker.socket... Dec 13 14:29:52.237086 systemd[1]: Listening on sshd.socket. Dec 13 14:29:52.238019 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:29:52.238382 systemd[1]: Listening on docker.socket. Dec 13 14:29:52.239422 systemd[1]: Reached target sockets.target. Dec 13 14:29:52.240276 systemd[1]: Reached target basic.target. Dec 13 14:29:52.241123 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:29:52.241146 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:29:52.241986 systemd[1]: Starting containerd.service... Dec 13 14:29:52.243650 systemd[1]: Starting dbus.service... Dec 13 14:29:52.245191 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:29:52.247069 systemd[1]: Starting extend-filesystems.service... Dec 13 14:29:52.248106 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:29:52.250520 jq[1179]: false Dec 13 14:29:52.249111 systemd[1]: Starting motdgen.service... Dec 13 14:29:52.250749 systemd[1]: Starting prepare-helm.service... Dec 13 14:29:52.253615 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:29:52.255493 systemd[1]: Starting sshd-keygen.service... Dec 13 14:29:52.260276 systemd[1]: Starting systemd-logind.service... Dec 13 14:29:52.261276 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:29:52.261340 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:29:52.261706 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:29:52.262392 systemd[1]: Starting update-engine.service... Dec 13 14:29:52.264155 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:29:52.266850 jq[1198]: true Dec 13 14:29:52.267224 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:29:52.267406 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:29:52.268416 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:29:52.268652 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:29:52.272195 dbus-daemon[1178]: [system] SELinux support is enabled Dec 13 14:29:52.272314 systemd[1]: Started dbus.service. Dec 13 14:29:52.274908 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:29:52.274963 systemd[1]: Reached target system-config.target. Dec 13 14:29:52.276133 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:29:52.276157 systemd[1]: Reached target user-config.target. Dec 13 14:29:52.280038 jq[1201]: true Dec 13 14:29:52.282110 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:29:52.282277 systemd[1]: Finished motdgen.service. Dec 13 14:29:52.283175 extend-filesystems[1180]: Found loop1 Dec 13 14:29:52.284239 extend-filesystems[1180]: Found sr0 Dec 13 14:29:52.292003 tar[1200]: linux-amd64/helm Dec 13 14:29:52.292614 extend-filesystems[1180]: Found vda Dec 13 14:29:52.292614 extend-filesystems[1180]: Found vda1 Dec 13 14:29:52.292614 extend-filesystems[1180]: Found vda2 Dec 13 14:29:52.292614 extend-filesystems[1180]: Found vda3 Dec 13 14:29:52.292614 extend-filesystems[1180]: Found usr Dec 13 14:29:52.292614 extend-filesystems[1180]: Found vda4 Dec 13 14:29:52.292614 extend-filesystems[1180]: Found vda6 Dec 13 14:29:52.292614 extend-filesystems[1180]: Found vda7 Dec 13 14:29:52.292614 extend-filesystems[1180]: Found vda9 Dec 13 14:29:52.292614 extend-filesystems[1180]: Checking size of /dev/vda9 Dec 13 14:29:52.303042 update_engine[1196]: I1213 14:29:52.296619 1196 main.cc:92] Flatcar Update Engine starting Dec 13 14:29:52.303042 update_engine[1196]: I1213 14:29:52.298892 1196 update_check_scheduler.cc:74] Next update check in 3m4s Dec 13 14:29:52.298868 systemd[1]: Started update-engine.service. Dec 13 14:29:52.301963 systemd[1]: Started locksmithd.service. Dec 13 14:29:52.305979 extend-filesystems[1180]: Resized partition /dev/vda9 Dec 13 14:29:52.310790 extend-filesystems[1223]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:29:52.314315 env[1202]: time="2024-12-13T14:29:52.312719000Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:29:52.321864 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 14:29:52.339701 systemd-logind[1194]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:29:52.339726 systemd-logind[1194]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:29:52.340512 systemd-logind[1194]: New seat seat0. Dec 13 14:29:52.342937 systemd[1]: Started systemd-logind.service. Dec 13 14:29:52.349870 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 14:29:52.371868 env[1202]: time="2024-12-13T14:29:52.353681379Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:29:52.367376 locksmithd[1220]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:29:52.372283 env[1202]: time="2024-12-13T14:29:52.372187024Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:29:52.372878 extend-filesystems[1223]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 14:29:52.372878 extend-filesystems[1223]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:29:52.372878 extend-filesystems[1223]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 14:29:52.379949 extend-filesystems[1180]: Resized filesystem in /dev/vda9 Dec 13 14:29:52.373709 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:29:52.381585 env[1202]: time="2024-12-13T14:29:52.373615092Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:29:52.381585 env[1202]: time="2024-12-13T14:29:52.373651911Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:29:52.381585 env[1202]: time="2024-12-13T14:29:52.373895848Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:29:52.381585 env[1202]: time="2024-12-13T14:29:52.373913041Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:29:52.381585 env[1202]: time="2024-12-13T14:29:52.373933148Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:29:52.381585 env[1202]: time="2024-12-13T14:29:52.373943247Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:29:52.381585 env[1202]: time="2024-12-13T14:29:52.374004442Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:29:52.381585 env[1202]: time="2024-12-13T14:29:52.374188307Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:29:52.381585 env[1202]: time="2024-12-13T14:29:52.374297692Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:29:52.381585 env[1202]: time="2024-12-13T14:29:52.374322458Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:29:52.373906 systemd[1]: Finished extend-filesystems.service. Dec 13 14:29:52.381941 env[1202]: time="2024-12-13T14:29:52.374362303Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:29:52.381941 env[1202]: time="2024-12-13T14:29:52.374373224Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:29:52.383297 bash[1234]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:29:52.383524 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:29:52.388337 env[1202]: time="2024-12-13T14:29:52.385512424Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:29:52.388337 env[1202]: time="2024-12-13T14:29:52.385541057Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:29:52.388337 env[1202]: time="2024-12-13T14:29:52.385556707Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:29:52.388337 env[1202]: time="2024-12-13T14:29:52.385597263Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:29:52.388337 env[1202]: time="2024-12-13T14:29:52.385611970Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:29:52.388337 env[1202]: time="2024-12-13T14:29:52.385625245Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:29:52.388337 env[1202]: time="2024-12-13T14:29:52.385636747Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:29:52.388337 env[1202]: time="2024-12-13T14:29:52.385685789Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:29:52.388337 env[1202]: time="2024-12-13T14:29:52.385708401Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:29:52.388337 env[1202]: time="2024-12-13T14:29:52.385722297Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:29:52.388337 env[1202]: time="2024-12-13T14:29:52.385735272Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:29:52.388337 env[1202]: time="2024-12-13T14:29:52.385747404Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:29:52.388337 env[1202]: time="2024-12-13T14:29:52.385851039Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:29:52.388337 env[1202]: time="2024-12-13T14:29:52.385932772Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:29:52.387536 systemd[1]: Started containerd.service. Dec 13 14:29:52.388691 env[1202]: time="2024-12-13T14:29:52.386142465Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:29:52.388691 env[1202]: time="2024-12-13T14:29:52.386162373Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:29:52.388691 env[1202]: time="2024-12-13T14:29:52.386174245Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:29:52.388691 env[1202]: time="2024-12-13T14:29:52.386215682Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:29:52.388691 env[1202]: time="2024-12-13T14:29:52.386226944Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:29:52.388691 env[1202]: time="2024-12-13T14:29:52.386238746Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:29:52.388691 env[1202]: time="2024-12-13T14:29:52.386249566Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:29:52.388691 env[1202]: time="2024-12-13T14:29:52.386260857Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:29:52.388691 env[1202]: time="2024-12-13T14:29:52.386271557Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:29:52.388691 env[1202]: time="2024-12-13T14:29:52.386281666Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:29:52.388691 env[1202]: time="2024-12-13T14:29:52.386294881Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:29:52.388691 env[1202]: time="2024-12-13T14:29:52.386306373Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:29:52.388691 env[1202]: time="2024-12-13T14:29:52.386402733Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:29:52.388691 env[1202]: time="2024-12-13T14:29:52.386417261Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:29:52.388691 env[1202]: time="2024-12-13T14:29:52.386427740Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:29:52.389000 env[1202]: time="2024-12-13T14:29:52.386437268Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:29:52.389000 env[1202]: time="2024-12-13T14:29:52.386449150Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:29:52.389000 env[1202]: time="2024-12-13T14:29:52.386459981Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:29:52.389000 env[1202]: time="2024-12-13T14:29:52.386476632Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:29:52.389000 env[1202]: time="2024-12-13T14:29:52.386508632Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:29:52.389103 env[1202]: time="2024-12-13T14:29:52.386673140Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:29:52.389103 env[1202]: time="2024-12-13T14:29:52.386718896Z" level=info msg="Connect containerd service" Dec 13 14:29:52.389103 env[1202]: time="2024-12-13T14:29:52.386747019Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:29:52.389103 env[1202]: time="2024-12-13T14:29:52.387237789Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:29:52.389103 env[1202]: time="2024-12-13T14:29:52.387421915Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:29:52.389103 env[1202]: time="2024-12-13T14:29:52.387450358Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:29:52.389103 env[1202]: time="2024-12-13T14:29:52.387487658Z" level=info msg="containerd successfully booted in 0.075492s" Dec 13 14:29:52.392770 env[1202]: time="2024-12-13T14:29:52.392737213Z" level=info msg="Start subscribing containerd event" Dec 13 14:29:52.392911 env[1202]: time="2024-12-13T14:29:52.392892835Z" level=info msg="Start recovering state" Dec 13 14:29:52.393061 env[1202]: time="2024-12-13T14:29:52.393044369Z" level=info msg="Start event monitor" Dec 13 14:29:52.393147 env[1202]: time="2024-12-13T14:29:52.393128306Z" level=info msg="Start snapshots syncer" Dec 13 14:29:52.393221 env[1202]: time="2024-12-13T14:29:52.393203026Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:29:52.393293 env[1202]: time="2024-12-13T14:29:52.393274791Z" level=info msg="Start streaming server" Dec 13 14:29:52.572156 systemd-networkd[1025]: eth0: Gained IPv6LL Dec 13 14:29:52.574156 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:29:52.575599 systemd[1]: Reached target network-online.target. Dec 13 14:29:52.578065 systemd[1]: Starting kubelet.service... Dec 13 14:29:52.715525 tar[1200]: linux-amd64/LICENSE Dec 13 14:29:52.715525 tar[1200]: linux-amd64/README.md Dec 13 14:29:52.718978 systemd[1]: Finished prepare-helm.service. Dec 13 14:29:53.114618 sshd_keygen[1197]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:29:53.133895 systemd[1]: Finished sshd-keygen.service. Dec 13 14:29:53.136272 systemd[1]: Starting issuegen.service... Dec 13 14:29:53.141457 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:29:53.141589 systemd[1]: Finished issuegen.service. Dec 13 14:29:53.143592 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:29:53.150231 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:29:53.159571 systemd[1]: Started getty@tty1.service. Dec 13 14:29:53.161455 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:29:53.162517 systemd[1]: Reached target getty.target. Dec 13 14:29:53.190759 systemd[1]: Started kubelet.service. Dec 13 14:29:53.192059 systemd[1]: Reached target multi-user.target. Dec 13 14:29:53.194256 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:29:53.200771 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:29:53.200933 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:29:53.202033 systemd[1]: Startup finished in 839ms (kernel) + 4.528s (initrd) + 5.213s (userspace) = 10.581s. Dec 13 14:29:53.604361 kubelet[1261]: E1213 14:29:53.604227 1261 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:29:53.606404 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:29:53.606532 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:29:56.613757 systemd[1]: Created slice system-sshd.slice. Dec 13 14:29:56.614793 systemd[1]: Started sshd@0-10.0.0.133:22-10.0.0.1:48694.service. Dec 13 14:29:56.657965 sshd[1270]: Accepted publickey for core from 10.0.0.1 port 48694 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:56.659798 sshd[1270]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:56.668377 systemd[1]: Created slice user-500.slice. Dec 13 14:29:56.669757 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:29:56.671571 systemd-logind[1194]: New session 1 of user core. Dec 13 14:29:56.677847 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:29:56.679260 systemd[1]: Starting user@500.service... Dec 13 14:29:56.682022 (systemd)[1273]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:56.754331 systemd[1273]: Queued start job for default target default.target. Dec 13 14:29:56.754833 systemd[1273]: Reached target paths.target. Dec 13 14:29:56.754873 systemd[1273]: Reached target sockets.target. Dec 13 14:29:56.754886 systemd[1273]: Reached target timers.target. Dec 13 14:29:56.754897 systemd[1273]: Reached target basic.target. Dec 13 14:29:56.754936 systemd[1273]: Reached target default.target. Dec 13 14:29:56.754961 systemd[1273]: Startup finished in 67ms. Dec 13 14:29:56.755066 systemd[1]: Started user@500.service. Dec 13 14:29:56.756318 systemd[1]: Started session-1.scope. Dec 13 14:29:56.810000 systemd[1]: Started sshd@1-10.0.0.133:22-10.0.0.1:48696.service. Dec 13 14:29:56.850733 sshd[1282]: Accepted publickey for core from 10.0.0.1 port 48696 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:56.852251 sshd[1282]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:56.856202 systemd-logind[1194]: New session 2 of user core. Dec 13 14:29:56.857276 systemd[1]: Started session-2.scope. Dec 13 14:29:56.911009 sshd[1282]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:56.914242 systemd[1]: sshd@1-10.0.0.133:22-10.0.0.1:48696.service: Deactivated successfully. Dec 13 14:29:56.914929 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:29:56.915517 systemd-logind[1194]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:29:56.916580 systemd[1]: Started sshd@2-10.0.0.133:22-10.0.0.1:48712.service. Dec 13 14:29:56.917470 systemd-logind[1194]: Removed session 2. Dec 13 14:29:56.954155 sshd[1288]: Accepted publickey for core from 10.0.0.1 port 48712 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:56.955480 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:56.959210 systemd-logind[1194]: New session 3 of user core. Dec 13 14:29:56.960030 systemd[1]: Started session-3.scope. Dec 13 14:29:57.011701 sshd[1288]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:57.014691 systemd[1]: sshd@2-10.0.0.133:22-10.0.0.1:48712.service: Deactivated successfully. Dec 13 14:29:57.015241 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:29:57.015778 systemd-logind[1194]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:29:57.016781 systemd[1]: Started sshd@3-10.0.0.133:22-10.0.0.1:48726.service. Dec 13 14:29:57.017439 systemd-logind[1194]: Removed session 3. Dec 13 14:29:57.054407 sshd[1294]: Accepted publickey for core from 10.0.0.1 port 48726 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:57.055892 sshd[1294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:57.059392 systemd-logind[1194]: New session 4 of user core. Dec 13 14:29:57.060338 systemd[1]: Started session-4.scope. Dec 13 14:29:57.115392 sshd[1294]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:57.118104 systemd[1]: sshd@3-10.0.0.133:22-10.0.0.1:48726.service: Deactivated successfully. Dec 13 14:29:57.118608 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:29:57.119196 systemd-logind[1194]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:29:57.120278 systemd[1]: Started sshd@4-10.0.0.133:22-10.0.0.1:48732.service. Dec 13 14:29:57.121238 systemd-logind[1194]: Removed session 4. Dec 13 14:29:57.158940 sshd[1301]: Accepted publickey for core from 10.0.0.1 port 48732 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:57.160350 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:57.164209 systemd-logind[1194]: New session 5 of user core. Dec 13 14:29:57.164995 systemd[1]: Started session-5.scope. Dec 13 14:29:57.220412 sudo[1304]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:29:57.220630 sudo[1304]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:29:57.231071 dbus-daemon[1178]: \xd0ݦ\x89 V: received setenforce notice (enforcing=1951446368) Dec 13 14:29:57.233216 sudo[1304]: pam_unix(sudo:session): session closed for user root Dec 13 14:29:57.234927 sshd[1301]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:57.238016 systemd[1]: sshd@4-10.0.0.133:22-10.0.0.1:48732.service: Deactivated successfully. Dec 13 14:29:57.238675 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:29:57.239327 systemd-logind[1194]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:29:57.240496 systemd[1]: Started sshd@5-10.0.0.133:22-10.0.0.1:48748.service. Dec 13 14:29:57.241423 systemd-logind[1194]: Removed session 5. Dec 13 14:29:57.278526 sshd[1308]: Accepted publickey for core from 10.0.0.1 port 48748 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:57.279529 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:57.283008 systemd-logind[1194]: New session 6 of user core. Dec 13 14:29:57.284048 systemd[1]: Started session-6.scope. Dec 13 14:29:57.338427 sudo[1312]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:29:57.338612 sudo[1312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:29:57.341967 sudo[1312]: pam_unix(sudo:session): session closed for user root Dec 13 14:29:57.347307 sudo[1311]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:29:57.347509 sudo[1311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:29:57.356334 systemd[1]: Stopping audit-rules.service... Dec 13 14:29:57.356000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:29:57.357896 auditctl[1315]: No rules Dec 13 14:29:57.358364 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:29:57.358619 kernel: kauditd_printk_skb: 265 callbacks suppressed Dec 13 14:29:57.358720 kernel: audit: type=1305 audit(1734100197.356:194): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:29:57.358607 systemd[1]: Stopped audit-rules.service. Dec 13 14:29:57.360588 systemd[1]: Starting audit-rules.service... Dec 13 14:29:57.356000 audit[1315]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe5bd3c6e0 a2=420 a3=0 items=0 ppid=1 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:57.366245 kernel: audit: type=1300 audit(1734100197.356:194): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe5bd3c6e0 a2=420 a3=0 items=0 ppid=1 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:57.367869 kernel: audit: type=1327 audit(1734100197.356:194): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:29:57.356000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:29:57.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:57.371634 kernel: audit: type=1131 audit(1734100197.357:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:57.377149 augenrules[1332]: No rules Dec 13 14:29:57.377929 systemd[1]: Finished audit-rules.service. Dec 13 14:29:57.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:57.379567 sudo[1311]: pam_unix(sudo:session): session closed for user root Dec 13 14:29:57.381193 sshd[1308]: pam_unix(sshd:session): session closed for user core Dec 13 14:29:57.378000 audit[1311]: USER_END pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:29:57.384250 systemd[1]: Started sshd@6-10.0.0.133:22-10.0.0.1:48754.service. Dec 13 14:29:57.384684 systemd[1]: sshd@5-10.0.0.133:22-10.0.0.1:48748.service: Deactivated successfully. Dec 13 14:29:57.385530 kernel: audit: type=1130 audit(1734100197.377:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:57.385578 kernel: audit: type=1106 audit(1734100197.378:197): pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:29:57.385603 kernel: audit: type=1104 audit(1734100197.378:198): pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:29:57.378000 audit[1311]: CRED_DISP pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:29:57.385411 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:29:57.386260 systemd-logind[1194]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:29:57.387185 systemd-logind[1194]: Removed session 6. Dec 13 14:29:57.381000 audit[1308]: USER_END pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:57.392816 kernel: audit: type=1106 audit(1734100197.381:199): pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:57.392868 kernel: audit: type=1104 audit(1734100197.381:200): pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:57.381000 audit[1308]: CRED_DISP pid=1308 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:57.396266 kernel: audit: type=1130 audit(1734100197.383:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.133:22-10.0.0.1:48754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:57.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.133:22-10.0.0.1:48754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:57.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.133:22-10.0.0.1:48748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:57.427000 audit[1337]: USER_ACCT pid=1337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:57.428991 sshd[1337]: Accepted publickey for core from 10.0.0.1 port 48754 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:29:57.428000 audit[1337]: CRED_ACQ pid=1337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:57.428000 audit[1337]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2b187400 a2=3 a3=0 items=0 ppid=1 pid=1337 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:57.428000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:29:57.430285 sshd[1337]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:29:57.433656 systemd-logind[1194]: New session 7 of user core. Dec 13 14:29:57.434304 systemd[1]: Started session-7.scope. Dec 13 14:29:57.437000 audit[1337]: USER_START pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:57.438000 audit[1340]: CRED_ACQ pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:29:57.485000 audit[1341]: USER_ACCT pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:29:57.486017 sudo[1341]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:29:57.485000 audit[1341]: CRED_REFR pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:29:57.486234 sudo[1341]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:29:57.486000 audit[1341]: USER_START pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:29:57.507715 systemd[1]: Starting docker.service... Dec 13 14:29:57.548078 env[1353]: time="2024-12-13T14:29:57.548005882Z" level=info msg="Starting up" Dec 13 14:29:57.549512 env[1353]: time="2024-12-13T14:29:57.549484675Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:29:57.549512 env[1353]: time="2024-12-13T14:29:57.549502228Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:29:57.549578 env[1353]: time="2024-12-13T14:29:57.549525361Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:29:57.549578 env[1353]: time="2024-12-13T14:29:57.549537634Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:29:57.551326 env[1353]: time="2024-12-13T14:29:57.551300059Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:29:57.551326 env[1353]: time="2024-12-13T14:29:57.551315779Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:29:57.551326 env[1353]: time="2024-12-13T14:29:57.551325587Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:29:57.551422 env[1353]: time="2024-12-13T14:29:57.551333592Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:29:58.000052 env[1353]: time="2024-12-13T14:29:57.999986677Z" level=info msg="Loading containers: start." Dec 13 14:29:58.053000 audit[1387]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1387 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.053000 audit[1387]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdfd4f1140 a2=0 a3=7ffdfd4f112c items=0 ppid=1353 pid=1387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.053000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:29:58.055000 audit[1389]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.055000 audit[1389]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd24cf2890 a2=0 a3=7ffd24cf287c items=0 ppid=1353 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.055000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:29:58.056000 audit[1391]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.056000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd8cf03aa0 a2=0 a3=7ffd8cf03a8c items=0 ppid=1353 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.056000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:29:58.058000 audit[1393]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.058000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd0d25c4a0 a2=0 a3=7ffd0d25c48c items=0 ppid=1353 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.058000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:29:58.060000 audit[1395]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.060000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc9b5f50b0 a2=0 a3=7ffc9b5f509c items=0 ppid=1353 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.060000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:29:58.080000 audit[1400]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.080000 audit[1400]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffd5f6a6c0 a2=0 a3=7fffd5f6a6ac items=0 ppid=1353 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.080000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:29:58.089000 audit[1402]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.089000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd10ec1ba0 a2=0 a3=7ffd10ec1b8c items=0 ppid=1353 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.089000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:29:58.091000 audit[1404]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.091000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffcce16b610 a2=0 a3=7ffcce16b5fc items=0 ppid=1353 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.091000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:29:58.093000 audit[1406]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.093000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff58c77600 a2=0 a3=7fff58c775ec items=0 ppid=1353 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.093000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:29:58.101000 audit[1410]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.101000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdec463f10 a2=0 a3=7ffdec463efc items=0 ppid=1353 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.101000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:29:58.105000 audit[1411]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.105000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe272a9600 a2=0 a3=7ffe272a95ec items=0 ppid=1353 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.105000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:29:58.114876 kernel: Initializing XFRM netlink socket Dec 13 14:29:58.142384 env[1353]: time="2024-12-13T14:29:58.142331715Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:29:58.157000 audit[1419]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.157000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffef11a5550 a2=0 a3=7ffef11a553c items=0 ppid=1353 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.157000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:29:58.169000 audit[1422]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.169000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcca173c70 a2=0 a3=7ffcca173c5c items=0 ppid=1353 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.169000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:29:58.172000 audit[1425]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.172000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd3debe8a0 a2=0 a3=7ffd3debe88c items=0 ppid=1353 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.172000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:29:58.173000 audit[1427]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.173000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffca55933f0 a2=0 a3=7ffca55933dc items=0 ppid=1353 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.173000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:29:58.175000 audit[1429]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.175000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffdd2bf84b0 a2=0 a3=7ffdd2bf849c items=0 ppid=1353 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.175000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:29:58.177000 audit[1431]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.177000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd1ebb1ec0 a2=0 a3=7ffd1ebb1eac items=0 ppid=1353 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.177000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:29:58.179000 audit[1433]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.179000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffde8bfbef0 a2=0 a3=7ffde8bfbedc items=0 ppid=1353 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.179000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:29:58.186000 audit[1436]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.186000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd2597a150 a2=0 a3=7ffd2597a13c items=0 ppid=1353 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.186000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:29:58.188000 audit[1438]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.188000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc4e4d5110 a2=0 a3=7ffc4e4d50fc items=0 ppid=1353 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.188000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:29:58.190000 audit[1440]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.190000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fffb0d6fff0 a2=0 a3=7fffb0d6ffdc items=0 ppid=1353 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.190000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:29:58.191000 audit[1442]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.191000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdd65ba480 a2=0 a3=7ffdd65ba46c items=0 ppid=1353 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.191000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:29:58.193164 systemd-networkd[1025]: docker0: Link UP Dec 13 14:29:58.201000 audit[1446]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.201000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd01d20dd0 a2=0 a3=7ffd01d20dbc items=0 ppid=1353 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.201000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:29:58.206000 audit[1447]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:29:58.206000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffeb192780 a2=0 a3=7fffeb19276c items=0 ppid=1353 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:29:58.206000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:29:58.208063 env[1353]: time="2024-12-13T14:29:58.208030964Z" level=info msg="Loading containers: done." Dec 13 14:29:58.217542 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4195722104-merged.mount: Deactivated successfully. Dec 13 14:29:58.222591 env[1353]: time="2024-12-13T14:29:58.222546266Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:29:58.222739 env[1353]: time="2024-12-13T14:29:58.222712878Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:29:58.222828 env[1353]: time="2024-12-13T14:29:58.222807806Z" level=info msg="Daemon has completed initialization" Dec 13 14:29:58.240211 systemd[1]: Started docker.service. Dec 13 14:29:58.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:29:58.244226 env[1353]: time="2024-12-13T14:29:58.244175889Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:29:58.897362 env[1202]: time="2024-12-13T14:29:58.897307864Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\"" Dec 13 14:29:59.975904 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount882749293.mount: Deactivated successfully. Dec 13 14:30:01.382787 env[1202]: time="2024-12-13T14:30:01.382682820Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:01.384551 env[1202]: time="2024-12-13T14:30:01.384489388Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:01.386527 env[1202]: time="2024-12-13T14:30:01.386504016Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:01.388341 env[1202]: time="2024-12-13T14:30:01.388299713Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ace6a943b058439bd6daeb74f152e7c36e6fc0b5e481cdff9364cd6ca0473e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:01.389001 env[1202]: time="2024-12-13T14:30:01.388977294Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\" returns image reference \"sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e\"" Dec 13 14:30:01.390340 env[1202]: time="2024-12-13T14:30:01.390318850Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\"" Dec 13 14:30:03.066311 env[1202]: time="2024-12-13T14:30:03.066231314Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:03.068056 env[1202]: time="2024-12-13T14:30:03.068005461Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:03.069593 env[1202]: time="2024-12-13T14:30:03.069567992Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:03.071274 env[1202]: time="2024-12-13T14:30:03.071244445Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4bd1d4a449e7a1a4f375bd7c71abf48a95f8949b38f725ded255077329f21f7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:03.071903 env[1202]: time="2024-12-13T14:30:03.071862204Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\" returns image reference \"sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079\"" Dec 13 14:30:03.072297 env[1202]: time="2024-12-13T14:30:03.072244932Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\"" Dec 13 14:30:03.857495 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:30:03.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:03.857740 systemd[1]: Stopped kubelet.service. Dec 13 14:30:03.858584 kernel: kauditd_printk_skb: 84 callbacks suppressed Dec 13 14:30:03.858627 kernel: audit: type=1130 audit(1734100203.856:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:03.859346 systemd[1]: Starting kubelet.service... Dec 13 14:30:03.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:03.864329 kernel: audit: type=1131 audit(1734100203.856:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:03.937516 systemd[1]: Started kubelet.service. Dec 13 14:30:03.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:03.941871 kernel: audit: type=1130 audit(1734100203.936:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:04.310106 kubelet[1488]: E1213 14:30:04.309959 1488 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:30:04.312791 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:30:04.312950 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:30:04.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:30:04.337870 kernel: audit: type=1131 audit(1734100204.312:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:30:05.194194 env[1202]: time="2024-12-13T14:30:05.194110056Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:05.196473 env[1202]: time="2024-12-13T14:30:05.196426500Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:05.198173 env[1202]: time="2024-12-13T14:30:05.198126959Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:05.199740 env[1202]: time="2024-12-13T14:30:05.199698266Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:1a3081cb7d21763d22eb2c0781cc462d89f501ed523ad558dea1226f128fbfdd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:05.200365 env[1202]: time="2024-12-13T14:30:05.200328167Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\" returns image reference \"sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674\"" Dec 13 14:30:05.200990 env[1202]: time="2024-12-13T14:30:05.200956225Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 14:30:06.331052 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2900264528.mount: Deactivated successfully. Dec 13 14:30:07.372256 env[1202]: time="2024-12-13T14:30:07.371035789Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:07.377267 env[1202]: time="2024-12-13T14:30:07.377176104Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:07.381528 env[1202]: time="2024-12-13T14:30:07.381440291Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:07.383568 env[1202]: time="2024-12-13T14:30:07.383531964Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:07.383934 env[1202]: time="2024-12-13T14:30:07.383891398Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 13 14:30:07.384368 env[1202]: time="2024-12-13T14:30:07.384307498Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:30:07.899458 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1143701860.mount: Deactivated successfully. Dec 13 14:30:09.015861 env[1202]: time="2024-12-13T14:30:09.015761827Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:09.018175 env[1202]: time="2024-12-13T14:30:09.018109220Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:09.019993 env[1202]: time="2024-12-13T14:30:09.019966463Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:09.021942 env[1202]: time="2024-12-13T14:30:09.021907613Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:09.022647 env[1202]: time="2024-12-13T14:30:09.022621983Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 14:30:09.023299 env[1202]: time="2024-12-13T14:30:09.023225054Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Dec 13 14:30:09.513879 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2806526298.mount: Deactivated successfully. Dec 13 14:30:09.520956 env[1202]: time="2024-12-13T14:30:09.520901515Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:09.531196 env[1202]: time="2024-12-13T14:30:09.531132662Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:09.533313 env[1202]: time="2024-12-13T14:30:09.533271623Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:09.535402 env[1202]: time="2024-12-13T14:30:09.535354750Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:09.536073 env[1202]: time="2024-12-13T14:30:09.536028904Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Dec 13 14:30:09.537071 env[1202]: time="2024-12-13T14:30:09.536653736Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Dec 13 14:30:10.371023 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2557102340.mount: Deactivated successfully. Dec 13 14:30:13.405508 env[1202]: time="2024-12-13T14:30:13.405381972Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:13.407704 env[1202]: time="2024-12-13T14:30:13.407648593Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:13.409650 env[1202]: time="2024-12-13T14:30:13.409599992Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:13.411648 env[1202]: time="2024-12-13T14:30:13.411598590Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:13.412420 env[1202]: time="2024-12-13T14:30:13.412378573Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" Dec 13 14:30:14.563771 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:30:14.564070 systemd[1]: Stopped kubelet.service. Dec 13 14:30:14.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:14.566209 systemd[1]: Starting kubelet.service... Dec 13 14:30:14.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:14.571744 kernel: audit: type=1130 audit(1734100214.563:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:14.571812 kernel: audit: type=1131 audit(1734100214.563:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:14.664337 systemd[1]: Started kubelet.service. Dec 13 14:30:14.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:14.667926 kernel: audit: type=1130 audit(1734100214.663:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:14.703183 kubelet[1518]: E1213 14:30:14.703117 1518 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:30:14.705437 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:30:14.705567 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:30:14.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:30:14.709863 kernel: audit: type=1131 audit(1734100214.704:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:30:15.753233 systemd[1]: Stopped kubelet.service. Dec 13 14:30:15.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:15.755642 systemd[1]: Starting kubelet.service... Dec 13 14:30:15.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:15.759694 kernel: audit: type=1130 audit(1734100215.752:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:15.759754 kernel: audit: type=1131 audit(1734100215.752:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:15.776156 systemd[1]: Reloading. Dec 13 14:30:15.857979 /usr/lib/systemd/system-generators/torcx-generator[1552]: time="2024-12-13T14:30:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:30:15.858306 /usr/lib/systemd/system-generators/torcx-generator[1552]: time="2024-12-13T14:30:15Z" level=info msg="torcx already run" Dec 13 14:30:16.311760 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:30:16.311777 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:30:16.328684 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:30:16.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.394806 kernel: audit: type=1400 audit(1734100216.387:246): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.394876 kernel: audit: type=1400 audit(1734100216.387:247): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.394899 kernel: audit: type=1400 audit(1734100216.387:248): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.400605 kernel: audit: type=1400 audit(1734100216.387:249): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.393000 audit: BPF prog-id=46 op=LOAD Dec 13 14:30:16.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.399000 audit: BPF prog-id=47 op=LOAD Dec 13 14:30:16.399000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:30:16.399000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:30:16.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.400000 audit: BPF prog-id=48 op=LOAD Dec 13 14:30:16.400000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:30:16.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit: BPF prog-id=49 op=LOAD Dec 13 14:30:16.402000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:30:16.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit: BPF prog-id=50 op=LOAD Dec 13 14:30:16.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.402000 audit: BPF prog-id=51 op=LOAD Dec 13 14:30:16.402000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:30:16.402000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit: BPF prog-id=52 op=LOAD Dec 13 14:30:16.403000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit: BPF prog-id=53 op=LOAD Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.403000 audit: BPF prog-id=54 op=LOAD Dec 13 14:30:16.403000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:30:16.403000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:30:16.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.404000 audit: BPF prog-id=55 op=LOAD Dec 13 14:30:16.404000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:30:16.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.406000 audit: BPF prog-id=56 op=LOAD Dec 13 14:30:16.406000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit: BPF prog-id=57 op=LOAD Dec 13 14:30:16.407000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit: BPF prog-id=58 op=LOAD Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.408000 audit: BPF prog-id=59 op=LOAD Dec 13 14:30:16.408000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:30:16.408000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:30:16.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.408000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.408000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.408000 audit: BPF prog-id=60 op=LOAD Dec 13 14:30:16.408000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:30:16.419098 systemd[1]: Started kubelet.service. Dec 13 14:30:16.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:16.420264 systemd[1]: Stopping kubelet.service... Dec 13 14:30:16.420484 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:30:16.420636 systemd[1]: Stopped kubelet.service. Dec 13 14:30:16.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:16.421983 systemd[1]: Starting kubelet.service... Dec 13 14:30:16.507153 systemd[1]: Started kubelet.service. Dec 13 14:30:16.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:16.551475 kubelet[1599]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:30:16.551475 kubelet[1599]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:30:16.551475 kubelet[1599]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:30:16.552879 kubelet[1599]: I1213 14:30:16.552812 1599 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:30:16.934600 kubelet[1599]: I1213 14:30:16.934547 1599 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:30:16.934600 kubelet[1599]: I1213 14:30:16.934579 1599 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:30:16.935129 kubelet[1599]: I1213 14:30:16.934829 1599 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:30:16.954925 kubelet[1599]: I1213 14:30:16.954872 1599 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:30:16.955249 kubelet[1599]: E1213 14:30:16.955196 1599 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.133:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.133:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:30:16.961073 kubelet[1599]: E1213 14:30:16.961038 1599 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:30:16.961073 kubelet[1599]: I1213 14:30:16.961065 1599 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:30:16.966135 kubelet[1599]: I1213 14:30:16.966104 1599 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:30:16.967113 kubelet[1599]: I1213 14:30:16.967086 1599 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:30:16.967315 kubelet[1599]: I1213 14:30:16.967272 1599 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:30:16.967508 kubelet[1599]: I1213 14:30:16.967306 1599 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:30:16.967625 kubelet[1599]: I1213 14:30:16.967512 1599 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:30:16.967625 kubelet[1599]: I1213 14:30:16.967525 1599 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:30:16.967702 kubelet[1599]: I1213 14:30:16.967666 1599 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:30:16.971004 kubelet[1599]: I1213 14:30:16.970979 1599 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:30:16.971004 kubelet[1599]: I1213 14:30:16.971004 1599 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:30:16.971101 kubelet[1599]: I1213 14:30:16.971046 1599 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:30:16.971101 kubelet[1599]: I1213 14:30:16.971060 1599 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:30:16.992140 kubelet[1599]: I1213 14:30:16.992097 1599 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:30:16.996313 kubelet[1599]: W1213 14:30:16.996264 1599 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.133:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 14:30:16.996442 kubelet[1599]: E1213 14:30:16.996418 1599 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.133:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.133:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:30:16.996783 kubelet[1599]: W1213 14:30:16.996712 1599 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.133:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 14:30:16.996834 kubelet[1599]: E1213 14:30:16.996804 1599 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.133:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.133:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:30:16.997804 kubelet[1599]: I1213 14:30:16.997770 1599 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:30:16.998277 kubelet[1599]: W1213 14:30:16.998249 1599 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:30:16.998869 kubelet[1599]: I1213 14:30:16.998781 1599 server.go:1269] "Started kubelet" Dec 13 14:30:16.999071 kubelet[1599]: I1213 14:30:16.999041 1599 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:30:17.000131 kubelet[1599]: I1213 14:30:17.000114 1599 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:30:16.999000 audit[1599]: AVC avc: denied { mac_admin } for pid=1599 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.999000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:30:16.999000 audit[1599]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aeb200 a1=c0006bd098 a2=c000aeb1d0 a3=25 items=0 ppid=1 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:16.999000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:30:16.999000 audit[1599]: AVC avc: denied { mac_admin } for pid=1599 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:16.999000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:30:16.999000 audit[1599]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005a4ec0 a1=c0006bd0b0 a2=c000aeb290 a3=25 items=0 ppid=1 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:16.999000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:30:17.000733 kubelet[1599]: I1213 14:30:17.000417 1599 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:30:17.000733 kubelet[1599]: I1213 14:30:17.000478 1599 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:30:17.000733 kubelet[1599]: I1213 14:30:17.000530 1599 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:30:17.000733 kubelet[1599]: I1213 14:30:16.999058 1599 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:30:17.001012 kubelet[1599]: I1213 14:30:17.000981 1599 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:30:17.001711 kubelet[1599]: I1213 14:30:17.001692 1599 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:30:17.002471 kubelet[1599]: E1213 14:30:17.002408 1599 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:30:17.002471 kubelet[1599]: I1213 14:30:17.002465 1599 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:30:17.002650 kubelet[1599]: I1213 14:30:17.002637 1599 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:30:17.002706 kubelet[1599]: I1213 14:30:17.002684 1599 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:30:17.003493 kubelet[1599]: W1213 14:30:17.003129 1599 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.133:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 14:30:17.003493 kubelet[1599]: E1213 14:30:17.003191 1599 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.133:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.133:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:30:17.003493 kubelet[1599]: I1213 14:30:17.003472 1599 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:30:17.002000 audit[1611]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1611 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:17.002000 audit[1611]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffda6d16ce0 a2=0 a3=7ffda6d16ccc items=0 ppid=1599 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:17.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:30:17.003742 kubelet[1599]: I1213 14:30:17.003527 1599 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:30:17.003742 kubelet[1599]: E1213 14:30:17.003539 1599 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:30:17.004000 audit[1612]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1612 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:17.004000 audit[1612]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf57c8b50 a2=0 a3=7ffcf57c8b3c items=0 ppid=1599 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:17.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:30:17.005211 kubelet[1599]: E1213 14:30:17.002335 1599 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.133:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.133:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.1810c2f5af239192 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 14:30:16.99876085 +0000 UTC m=+0.488669100,LastTimestamp:2024-12-13 14:30:16.99876085 +0000 UTC m=+0.488669100,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 14:30:17.005520 kubelet[1599]: I1213 14:30:17.005499 1599 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:30:17.005952 kubelet[1599]: E1213 14:30:17.005922 1599 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.133:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.133:6443: connect: connection refused" interval="200ms" Dec 13 14:30:17.006000 audit[1614]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1614 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:17.006000 audit[1614]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe8cc2d2d0 a2=0 a3=7ffe8cc2d2bc items=0 ppid=1599 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:17.006000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:30:17.007000 audit[1616]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1616 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:17.007000 audit[1616]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffff25c91f0 a2=0 a3=7ffff25c91dc items=0 ppid=1599 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:17.007000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:30:17.013000 audit[1621]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1621 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:17.013000 audit[1621]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffde107e50 a2=0 a3=7fffde107e3c items=0 ppid=1599 pid=1621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:17.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:30:17.014748 kubelet[1599]: I1213 14:30:17.014708 1599 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:30:17.014000 audit[1622]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1622 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:17.014000 audit[1622]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc13a6ca20 a2=0 a3=7ffc13a6ca0c items=0 ppid=1599 pid=1622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:17.014000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:30:17.015852 kubelet[1599]: I1213 14:30:17.015813 1599 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:30:17.015000 audit[1623]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1623 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:17.015000 audit[1623]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2a601620 a2=0 a3=7ffc2a60160c items=0 ppid=1599 pid=1623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:17.015000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:30:17.016092 kubelet[1599]: I1213 14:30:17.015863 1599 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:30:17.016092 kubelet[1599]: I1213 14:30:17.015879 1599 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:30:17.016092 kubelet[1599]: E1213 14:30:17.015911 1599 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:30:17.015000 audit[1625]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:17.015000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdff672f50 a2=0 a3=7ffdff672f3c items=0 ppid=1599 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:17.015000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:30:17.017178 kubelet[1599]: W1213 14:30:17.017103 1599 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.133:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 14:30:17.017178 kubelet[1599]: E1213 14:30:17.017142 1599 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.133:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.133:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:30:17.016000 audit[1626]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1626 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:17.016000 audit[1626]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd6e8aa90 a2=0 a3=7ffdd6e8aa7c items=0 ppid=1599 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:17.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:30:17.017000 audit[1627]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:17.017000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff17cc74d0 a2=0 a3=7fff17cc74bc items=0 ppid=1599 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:17.017000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:30:17.017000 audit[1628]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:17.017000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd26ddcf70 a2=0 a3=7ffd26ddcf5c items=0 ppid=1599 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:17.017000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:30:17.018602 kubelet[1599]: I1213 14:30:17.018584 1599 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:30:17.018602 kubelet[1599]: I1213 14:30:17.018598 1599 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:30:17.018671 kubelet[1599]: I1213 14:30:17.018611 1599 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:30:17.018000 audit[1629]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:17.018000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd494d7940 a2=0 a3=7ffd494d792c items=0 ppid=1599 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:17.018000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:30:17.103021 kubelet[1599]: E1213 14:30:17.102981 1599 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:30:17.116239 kubelet[1599]: E1213 14:30:17.116206 1599 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 14:30:17.203623 kubelet[1599]: E1213 14:30:17.203480 1599 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:30:17.207031 kubelet[1599]: E1213 14:30:17.206991 1599 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.133:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.133:6443: connect: connection refused" interval="400ms" Dec 13 14:30:17.247825 kubelet[1599]: I1213 14:30:17.247772 1599 policy_none.go:49] "None policy: Start" Dec 13 14:30:17.248709 kubelet[1599]: I1213 14:30:17.248679 1599 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:30:17.248766 kubelet[1599]: I1213 14:30:17.248718 1599 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:30:17.260585 systemd[1]: Created slice kubepods.slice. Dec 13 14:30:17.264023 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:30:17.266322 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:30:17.279693 kubelet[1599]: I1213 14:30:17.279671 1599 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:30:17.278000 audit[1599]: AVC avc: denied { mac_admin } for pid=1599 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:17.278000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:30:17.278000 audit[1599]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006013e0 a1=c000d168b8 a2=c0006013b0 a3=25 items=0 ppid=1 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:17.278000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:30:17.280080 kubelet[1599]: I1213 14:30:17.279995 1599 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:30:17.280261 kubelet[1599]: I1213 14:30:17.280248 1599 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:30:17.280309 kubelet[1599]: I1213 14:30:17.280262 1599 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:30:17.280730 kubelet[1599]: I1213 14:30:17.280493 1599 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:30:17.281324 kubelet[1599]: E1213 14:30:17.281297 1599 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Dec 13 14:30:17.322190 systemd[1]: Created slice kubepods-burstable-podcb880e18749498f6aaa9e82420d5c181.slice. Dec 13 14:30:17.330965 systemd[1]: Created slice kubepods-burstable-pod50a9ae38ddb3bec3278d8dc73a6a7009.slice. Dec 13 14:30:17.341659 systemd[1]: Created slice kubepods-burstable-poda52b86ce975f496e6002ba953fa9b888.slice. Dec 13 14:30:17.381965 kubelet[1599]: I1213 14:30:17.381930 1599 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:30:17.382261 kubelet[1599]: E1213 14:30:17.382230 1599 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.133:6443/api/v1/nodes\": dial tcp 10.0.0.133:6443: connect: connection refused" node="localhost" Dec 13 14:30:17.404570 kubelet[1599]: I1213 14:30:17.404542 1599 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/cb880e18749498f6aaa9e82420d5c181-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"cb880e18749498f6aaa9e82420d5c181\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:30:17.404570 kubelet[1599]: I1213 14:30:17.404567 1599 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/cb880e18749498f6aaa9e82420d5c181-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"cb880e18749498f6aaa9e82420d5c181\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:30:17.404669 kubelet[1599]: I1213 14:30:17.404586 1599 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:30:17.404669 kubelet[1599]: I1213 14:30:17.404605 1599 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:30:17.404669 kubelet[1599]: I1213 14:30:17.404623 1599 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/cb880e18749498f6aaa9e82420d5c181-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"cb880e18749498f6aaa9e82420d5c181\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:30:17.404669 kubelet[1599]: I1213 14:30:17.404665 1599 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:30:17.404761 kubelet[1599]: I1213 14:30:17.404683 1599 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:30:17.404761 kubelet[1599]: I1213 14:30:17.404696 1599 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:30:17.404761 kubelet[1599]: I1213 14:30:17.404709 1599 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a52b86ce975f496e6002ba953fa9b888-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"a52b86ce975f496e6002ba953fa9b888\") " pod="kube-system/kube-scheduler-localhost" Dec 13 14:30:17.584087 kubelet[1599]: I1213 14:30:17.583963 1599 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:30:17.584410 kubelet[1599]: E1213 14:30:17.584254 1599 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.133:6443/api/v1/nodes\": dial tcp 10.0.0.133:6443: connect: connection refused" node="localhost" Dec 13 14:30:17.608392 kubelet[1599]: E1213 14:30:17.608306 1599 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.133:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.133:6443: connect: connection refused" interval="800ms" Dec 13 14:30:17.629941 kubelet[1599]: E1213 14:30:17.629878 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:17.630736 env[1202]: time="2024-12-13T14:30:17.630684402Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:cb880e18749498f6aaa9e82420d5c181,Namespace:kube-system,Attempt:0,}" Dec 13 14:30:17.641078 kubelet[1599]: E1213 14:30:17.641035 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:17.641716 env[1202]: time="2024-12-13T14:30:17.641657311Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:50a9ae38ddb3bec3278d8dc73a6a7009,Namespace:kube-system,Attempt:0,}" Dec 13 14:30:17.643944 kubelet[1599]: E1213 14:30:17.643916 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:17.644427 env[1202]: time="2024-12-13T14:30:17.644380507Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:a52b86ce975f496e6002ba953fa9b888,Namespace:kube-system,Attempt:0,}" Dec 13 14:30:17.833906 kubelet[1599]: W1213 14:30:17.833808 1599 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.133:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 14:30:17.833906 kubelet[1599]: E1213 14:30:17.833898 1599 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.133:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.133:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:30:17.837536 kubelet[1599]: W1213 14:30:17.837435 1599 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.133:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 14:30:17.837536 kubelet[1599]: E1213 14:30:17.837480 1599 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.133:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.133:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:30:17.922437 kubelet[1599]: W1213 14:30:17.922371 1599 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.133:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 14:30:17.922568 kubelet[1599]: E1213 14:30:17.922442 1599 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.133:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.133:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:30:17.985981 kubelet[1599]: I1213 14:30:17.985933 1599 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:30:17.986298 kubelet[1599]: E1213 14:30:17.986260 1599 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.133:6443/api/v1/nodes\": dial tcp 10.0.0.133:6443: connect: connection refused" node="localhost" Dec 13 14:30:18.309648 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2124626282.mount: Deactivated successfully. Dec 13 14:30:18.315072 env[1202]: time="2024-12-13T14:30:18.315036948Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:18.318426 env[1202]: time="2024-12-13T14:30:18.318395216Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:18.320858 env[1202]: time="2024-12-13T14:30:18.320822638Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:18.322467 env[1202]: time="2024-12-13T14:30:18.322437526Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:18.323698 env[1202]: time="2024-12-13T14:30:18.323673043Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:18.324873 env[1202]: time="2024-12-13T14:30:18.324830003Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:18.326104 env[1202]: time="2024-12-13T14:30:18.326056203Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:18.327433 env[1202]: time="2024-12-13T14:30:18.327404431Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:18.328565 env[1202]: time="2024-12-13T14:30:18.328538308Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:18.329664 env[1202]: time="2024-12-13T14:30:18.329640655Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:18.331161 env[1202]: time="2024-12-13T14:30:18.331135889Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:18.332652 env[1202]: time="2024-12-13T14:30:18.332621755Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:18.347219 env[1202]: time="2024-12-13T14:30:18.347125676Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:30:18.347219 env[1202]: time="2024-12-13T14:30:18.347169387Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:30:18.347219 env[1202]: time="2024-12-13T14:30:18.347182101Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:30:18.347462 env[1202]: time="2024-12-13T14:30:18.347316724Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f46b47023ebc249042379c9699e4aaad6994344963d3ae7f5ff934299339ffd7 pid=1639 runtime=io.containerd.runc.v2 Dec 13 14:30:18.363115 systemd[1]: Started cri-containerd-f46b47023ebc249042379c9699e4aaad6994344963d3ae7f5ff934299339ffd7.scope. Dec 13 14:30:18.371302 env[1202]: time="2024-12-13T14:30:18.371204903Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:30:18.371466 env[1202]: time="2024-12-13T14:30:18.371306904Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:30:18.371688 env[1202]: time="2024-12-13T14:30:18.371350686Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:30:18.372294 env[1202]: time="2024-12-13T14:30:18.372205890Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/def2e137c221ca71e6fafb2029b6ee710ce5bac1a4161445384b9270be84d7f7 pid=1674 runtime=io.containerd.runc.v2 Dec 13 14:30:18.374126 env[1202]: time="2024-12-13T14:30:18.373982141Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:30:18.374126 env[1202]: time="2024-12-13T14:30:18.374015804Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:30:18.374126 env[1202]: time="2024-12-13T14:30:18.374025242Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:30:18.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit: BPF prog-id=61 op=LOAD Dec 13 14:30:18.374000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1639 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634366234373032336562633234393034323337396339363939653461 Dec 13 14:30:18.374000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1639 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634366234373032336562633234393034323337396339363939653461 Dec 13 14:30:18.374000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.374000 audit: BPF prog-id=62 op=LOAD Dec 13 14:30:18.374000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000301780 items=0 ppid=1639 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634366234373032336562633234393034323337396339363939653461 Dec 13 14:30:18.375000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.375000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.375000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.375000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.375000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.375000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.375000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.375000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.375000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.375000 audit: BPF prog-id=63 op=LOAD Dec 13 14:30:18.375000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003017c8 items=0 ppid=1639 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634366234373032336562633234393034323337396339363939653461 Dec 13 14:30:18.375000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:30:18.375000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:30:18.375000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.375000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.375000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.375000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.375000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.375000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.375000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.375000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.375000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.375000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.375000 audit: BPF prog-id=64 op=LOAD Dec 13 14:30:18.375000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000301bd8 items=0 ppid=1639 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634366234373032336562633234393034323337396339363939653461 Dec 13 14:30:18.377193 env[1202]: time="2024-12-13T14:30:18.376489563Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9e71a2b5d5c2fc4ac37de0e8b364de4549ea3074990a4fca19ad219b3ec08876 pid=1689 runtime=io.containerd.runc.v2 Dec 13 14:30:18.382721 systemd[1]: Started cri-containerd-def2e137c221ca71e6fafb2029b6ee710ce5bac1a4161445384b9270be84d7f7.scope. Dec 13 14:30:18.391531 systemd[1]: Started cri-containerd-9e71a2b5d5c2fc4ac37de0e8b364de4549ea3074990a4fca19ad219b3ec08876.scope. Dec 13 14:30:18.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.399000 audit: BPF prog-id=65 op=LOAD Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1674 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465663265313337633232316361373165366661666232303239623665 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1674 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465663265313337633232316361373165366661666232303239623665 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit: BPF prog-id=66 op=LOAD Dec 13 14:30:18.400000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000311580 items=0 ppid=1674 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465663265313337633232316361373165366661666232303239623665 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit: BPF prog-id=67 op=LOAD Dec 13 14:30:18.400000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003115c8 items=0 ppid=1674 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465663265313337633232316361373165366661666232303239623665 Dec 13 14:30:18.400000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:30:18.400000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { perfmon } for pid=1696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit[1696]: AVC avc: denied { bpf } for pid=1696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.400000 audit: BPF prog-id=68 op=LOAD Dec 13 14:30:18.400000 audit[1696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003119d8 items=0 ppid=1674 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465663265313337633232316361373165366661666232303239623665 Dec 13 14:30:18.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.402000 audit: BPF prog-id=69 op=LOAD Dec 13 14:30:18.402000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.402000 audit[1704]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1689 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965373161326235643563326663346163333764653065386233363464 Dec 13 14:30:18.402000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.402000 audit[1704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1689 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965373161326235643563326663346163333764653065386233363464 Dec 13 14:30:18.402000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.402000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.402000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.402000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.402000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.402000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.402000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.402000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.402000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.402000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.402000 audit: BPF prog-id=70 op=LOAD Dec 13 14:30:18.402000 audit[1704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009be60 items=0 ppid=1689 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965373161326235643563326663346163333764653065386233363464 Dec 13 14:30:18.403000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.403000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.403000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.403000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.403000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.403000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.403000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.403000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.403000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.403000 audit: BPF prog-id=71 op=LOAD Dec 13 14:30:18.403000 audit[1704]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009bea8 items=0 ppid=1689 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965373161326235643563326663346163333764653065386233363464 Dec 13 14:30:18.403000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:30:18.403000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:30:18.403000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.403000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.403000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.403000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.403000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.403000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.403000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.403000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.403000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.403000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.403000 audit: BPF prog-id=72 op=LOAD Dec 13 14:30:18.403000 audit[1704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00038e2b8 items=0 ppid=1689 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965373161326235643563326663346163333764653065386233363464 Dec 13 14:30:18.411884 kubelet[1599]: E1213 14:30:18.411366 1599 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.133:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.133:6443: connect: connection refused" interval="1.6s" Dec 13 14:30:18.421736 env[1202]: time="2024-12-13T14:30:18.421642732Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:cb880e18749498f6aaa9e82420d5c181,Namespace:kube-system,Attempt:0,} returns sandbox id \"f46b47023ebc249042379c9699e4aaad6994344963d3ae7f5ff934299339ffd7\"" Dec 13 14:30:18.424107 kubelet[1599]: E1213 14:30:18.424072 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:18.426395 env[1202]: time="2024-12-13T14:30:18.426359958Z" level=info msg="CreateContainer within sandbox \"f46b47023ebc249042379c9699e4aaad6994344963d3ae7f5ff934299339ffd7\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:30:18.430867 env[1202]: time="2024-12-13T14:30:18.430800245Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:50a9ae38ddb3bec3278d8dc73a6a7009,Namespace:kube-system,Attempt:0,} returns sandbox id \"def2e137c221ca71e6fafb2029b6ee710ce5bac1a4161445384b9270be84d7f7\"" Dec 13 14:30:18.431915 kubelet[1599]: E1213 14:30:18.431743 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:18.433188 env[1202]: time="2024-12-13T14:30:18.433156524Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:a52b86ce975f496e6002ba953fa9b888,Namespace:kube-system,Attempt:0,} returns sandbox id \"9e71a2b5d5c2fc4ac37de0e8b364de4549ea3074990a4fca19ad219b3ec08876\"" Dec 13 14:30:18.433575 env[1202]: time="2024-12-13T14:30:18.433550894Z" level=info msg="CreateContainer within sandbox \"def2e137c221ca71e6fafb2029b6ee710ce5bac1a4161445384b9270be84d7f7\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:30:18.434086 kubelet[1599]: E1213 14:30:18.434063 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:18.435440 env[1202]: time="2024-12-13T14:30:18.435409429Z" level=info msg="CreateContainer within sandbox \"9e71a2b5d5c2fc4ac37de0e8b364de4549ea3074990a4fca19ad219b3ec08876\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:30:18.446433 env[1202]: time="2024-12-13T14:30:18.446366357Z" level=info msg="CreateContainer within sandbox \"f46b47023ebc249042379c9699e4aaad6994344963d3ae7f5ff934299339ffd7\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"c37bf59af9eeef76957c607b5310e80a679c7b8ef272c602009d00ef381ad0a2\"" Dec 13 14:30:18.446975 env[1202]: time="2024-12-13T14:30:18.446946465Z" level=info msg="StartContainer for \"c37bf59af9eeef76957c607b5310e80a679c7b8ef272c602009d00ef381ad0a2\"" Dec 13 14:30:18.459483 env[1202]: time="2024-12-13T14:30:18.459207559Z" level=info msg="CreateContainer within sandbox \"def2e137c221ca71e6fafb2029b6ee710ce5bac1a4161445384b9270be84d7f7\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"da08f017ed141f11950e75a089468d55e1ef4dd8d39d8364765993cf36a9a313\"" Dec 13 14:30:18.459920 env[1202]: time="2024-12-13T14:30:18.459897333Z" level=info msg="StartContainer for \"da08f017ed141f11950e75a089468d55e1ef4dd8d39d8364765993cf36a9a313\"" Dec 13 14:30:18.460516 env[1202]: time="2024-12-13T14:30:18.460480176Z" level=info msg="CreateContainer within sandbox \"9e71a2b5d5c2fc4ac37de0e8b364de4549ea3074990a4fca19ad219b3ec08876\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"409350c85040dd40d07732f34451255eb9916f026961f06290151bb5a168ab23\"" Dec 13 14:30:18.460890 env[1202]: time="2024-12-13T14:30:18.460864276Z" level=info msg="StartContainer for \"409350c85040dd40d07732f34451255eb9916f026961f06290151bb5a168ab23\"" Dec 13 14:30:18.462256 systemd[1]: Started cri-containerd-c37bf59af9eeef76957c607b5310e80a679c7b8ef272c602009d00ef381ad0a2.scope. Dec 13 14:30:18.466363 kubelet[1599]: W1213 14:30:18.466271 1599 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.133:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.133:6443: connect: connection refused Dec 13 14:30:18.466536 kubelet[1599]: E1213 14:30:18.466396 1599 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.133:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.133:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:30:18.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit: BPF prog-id=73 op=LOAD Dec 13 14:30:18.474000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1764]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1639 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333376266353961663965656566373639353763363037623533313065 Dec 13 14:30:18.474000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1764]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1639 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333376266353961663965656566373639353763363037623533313065 Dec 13 14:30:18.474000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.474000 audit: BPF prog-id=74 op=LOAD Dec 13 14:30:18.474000 audit[1764]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001c9940 items=0 ppid=1639 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333376266353961663965656566373639353763363037623533313065 Dec 13 14:30:18.475000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.475000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.475000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.475000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.475000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.475000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.475000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.475000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.475000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.475000 audit: BPF prog-id=75 op=LOAD Dec 13 14:30:18.475000 audit[1764]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001c9988 items=0 ppid=1639 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333376266353961663965656566373639353763363037623533313065 Dec 13 14:30:18.475000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:30:18.475000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:30:18.475000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.475000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.475000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.475000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.475000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.475000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.475000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.475000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.475000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.475000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.475000 audit: BPF prog-id=76 op=LOAD Dec 13 14:30:18.475000 audit[1764]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001c9d98 items=0 ppid=1639 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333376266353961663965656566373639353763363037623533313065 Dec 13 14:30:18.481054 systemd[1]: Started cri-containerd-da08f017ed141f11950e75a089468d55e1ef4dd8d39d8364765993cf36a9a313.scope. Dec 13 14:30:18.487109 systemd[1]: Started cri-containerd-409350c85040dd40d07732f34451255eb9916f026961f06290151bb5a168ab23.scope. Dec 13 14:30:18.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.496000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.496000 audit: BPF prog-id=77 op=LOAD Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1689 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430393335306338353034306464343064303737333266333434353132 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1689 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430393335306338353034306464343064303737333266333434353132 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit: BPF prog-id=78 op=LOAD Dec 13 14:30:18.497000 audit[1800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000238ad0 items=0 ppid=1689 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430393335306338353034306464343064303737333266333434353132 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit: BPF prog-id=79 op=LOAD Dec 13 14:30:18.497000 audit[1800]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000238b18 items=0 ppid=1689 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430393335306338353034306464343064303737333266333434353132 Dec 13 14:30:18.497000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:30:18.497000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { perfmon } for pid=1800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit[1800]: AVC avc: denied { bpf } for pid=1800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.497000 audit: BPF prog-id=80 op=LOAD Dec 13 14:30:18.497000 audit[1800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000238f28 items=0 ppid=1689 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430393335306338353034306464343064303737333266333434353132 Dec 13 14:30:18.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.503000 audit: BPF prog-id=81 op=LOAD Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1674 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461303866303137656431343166313139353065373561303839343638 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1674 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461303866303137656431343166313139353065373561303839343638 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit: BPF prog-id=82 op=LOAD Dec 13 14:30:18.504000 audit[1787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00036c0d0 items=0 ppid=1674 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461303866303137656431343166313139353065373561303839343638 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit: BPF prog-id=83 op=LOAD Dec 13 14:30:18.504000 audit[1787]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00036c118 items=0 ppid=1674 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461303866303137656431343166313139353065373561303839343638 Dec 13 14:30:18.504000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:30:18.504000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { perfmon } for pid=1787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit[1787]: AVC avc: denied { bpf } for pid=1787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:18.504000 audit: BPF prog-id=84 op=LOAD Dec 13 14:30:18.504000 audit[1787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00036c528 items=0 ppid=1674 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:18.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461303866303137656431343166313139353065373561303839343638 Dec 13 14:30:18.507712 env[1202]: time="2024-12-13T14:30:18.507679982Z" level=info msg="StartContainer for \"c37bf59af9eeef76957c607b5310e80a679c7b8ef272c602009d00ef381ad0a2\" returns successfully" Dec 13 14:30:18.527185 env[1202]: time="2024-12-13T14:30:18.526968255Z" level=info msg="StartContainer for \"409350c85040dd40d07732f34451255eb9916f026961f06290151bb5a168ab23\" returns successfully" Dec 13 14:30:18.536016 env[1202]: time="2024-12-13T14:30:18.535969315Z" level=info msg="StartContainer for \"da08f017ed141f11950e75a089468d55e1ef4dd8d39d8364765993cf36a9a313\" returns successfully" Dec 13 14:30:18.787698 kubelet[1599]: I1213 14:30:18.787563 1599 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:30:19.023556 kubelet[1599]: E1213 14:30:19.023465 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:19.024989 kubelet[1599]: E1213 14:30:19.024933 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:19.026198 kubelet[1599]: E1213 14:30:19.026146 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:19.293000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:19.293000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000058960 a2=fc6 a3=0 items=0 ppid=1674 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 key=(null) Dec 13 14:30:19.294000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:19.294000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0009fc4a0 a2=fc6 a3=0 items=0 ppid=1674 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 key=(null) Dec 13 14:30:19.294000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:30:19.293000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:30:19.590853 kernel: kauditd_printk_skb: 567 callbacks suppressed Dec 13 14:30:19.590997 kernel: audit: type=1400 audit(1734100219.579:546): avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:19.591019 kernel: audit: type=1400 audit(1734100219.579:547): avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:19.591034 kernel: audit: type=1300 audit(1734100219.579:547): arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c009168020 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:30:19.579000 audit[1786]: AVC avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:19.579000 audit[1786]: AVC avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:19.579000 audit[1786]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c009168020 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:30:19.579000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:30:19.597859 kernel: audit: type=1327 audit(1734100219.579:547): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:30:19.597901 kernel: audit: type=1300 audit(1734100219.579:546): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00373c120 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:30:19.579000 audit[1786]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00373c120 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:30:19.602503 kernel: audit: type=1327 audit(1734100219.579:546): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:30:19.579000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:30:19.610206 kernel: audit: type=1400 audit(1734100219.580:548): avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:19.580000 audit[1786]: AVC avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:19.614143 kernel: audit: type=1400 audit(1734100219.587:549): avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:19.587000 audit[1786]: AVC avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:19.618898 kernel: audit: type=1300 audit(1734100219.587:549): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0092db300 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:30:19.587000 audit[1786]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0092db300 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:30:19.623263 kernel: audit: type=1327 audit(1734100219.587:549): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:30:19.587000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:30:19.587000 audit[1786]: AVC avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:19.587000 audit[1786]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00373c6c0 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:30:19.587000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:30:19.580000 audit[1786]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0073120f0 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:30:19.580000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:30:19.587000 audit[1786]: AVC avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:19.587000 audit[1786]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c004483c80 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:30:19.587000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:30:19.791610 kubelet[1599]: I1213 14:30:19.791545 1599 kubelet_node_status.go:75] "Successfully registered node" node="localhost" Dec 13 14:30:19.791610 kubelet[1599]: E1213 14:30:19.791591 1599 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" Dec 13 14:30:19.869491 kubelet[1599]: E1213 14:30:19.869361 1599 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:30:19.969856 kubelet[1599]: E1213 14:30:19.969780 1599 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:30:20.028017 kubelet[1599]: E1213 14:30:20.027986 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:20.067750 kubelet[1599]: E1213 14:30:20.067695 1599 controller.go:145] "Failed to ensure lease exists, will retry" err="namespaces \"kube-node-lease\" not found" interval="3.2s" Dec 13 14:30:20.070762 kubelet[1599]: E1213 14:30:20.070739 1599 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:30:20.171775 kubelet[1599]: E1213 14:30:20.171566 1599 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:30:20.272542 kubelet[1599]: E1213 14:30:20.272484 1599 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:30:20.373553 kubelet[1599]: E1213 14:30:20.373470 1599 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:30:20.474424 kubelet[1599]: E1213 14:30:20.474268 1599 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:30:20.575238 kubelet[1599]: E1213 14:30:20.575196 1599 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:30:20.675405 kubelet[1599]: E1213 14:30:20.675342 1599 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:30:20.776052 kubelet[1599]: E1213 14:30:20.775932 1599 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:30:20.876485 kubelet[1599]: E1213 14:30:20.876420 1599 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:30:20.923501 kubelet[1599]: E1213 14:30:20.923455 1599 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:20.976807 kubelet[1599]: E1213 14:30:20.976745 1599 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:30:21.452711 systemd[1]: Reloading. Dec 13 14:30:21.524823 /usr/lib/systemd/system-generators/torcx-generator[1891]: time="2024-12-13T14:30:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:30:21.524877 /usr/lib/systemd/system-generators/torcx-generator[1891]: time="2024-12-13T14:30:21Z" level=info msg="torcx already run" Dec 13 14:30:21.586216 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:30:21.586234 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:30:21.603319 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:30:21.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.671000 audit: BPF prog-id=85 op=LOAD Dec 13 14:30:21.671000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:30:21.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.671000 audit: BPF prog-id=86 op=LOAD Dec 13 14:30:21.671000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit: BPF prog-id=87 op=LOAD Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit: BPF prog-id=88 op=LOAD Dec 13 14:30:21.672000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:30:21.672000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit: BPF prog-id=89 op=LOAD Dec 13 14:30:21.673000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit: BPF prog-id=90 op=LOAD Dec 13 14:30:21.673000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.674000 audit: BPF prog-id=91 op=LOAD Dec 13 14:30:21.674000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit: BPF prog-id=92 op=LOAD Dec 13 14:30:21.675000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit: BPF prog-id=93 op=LOAD Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.675000 audit: BPF prog-id=94 op=LOAD Dec 13 14:30:21.675000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:30:21.675000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:30:21.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.676000 audit: BPF prog-id=95 op=LOAD Dec 13 14:30:21.676000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:30:21.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit: BPF prog-id=96 op=LOAD Dec 13 14:30:21.677000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit: BPF prog-id=97 op=LOAD Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.677000 audit: BPF prog-id=98 op=LOAD Dec 13 14:30:21.677000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:30:21.677000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit: BPF prog-id=99 op=LOAD Dec 13 14:30:21.678000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.678000 audit: BPF prog-id=100 op=LOAD Dec 13 14:30:21.678000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:30:21.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.681000 audit: BPF prog-id=101 op=LOAD Dec 13 14:30:21.681000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit: BPF prog-id=102 op=LOAD Dec 13 14:30:21.682000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit: BPF prog-id=103 op=LOAD Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit: BPF prog-id=104 op=LOAD Dec 13 14:30:21.682000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:30:21.682000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.683000 audit: BPF prog-id=105 op=LOAD Dec 13 14:30:21.683000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:30:21.695111 systemd[1]: Stopping kubelet.service... Dec 13 14:30:21.697353 kubelet[1599]: I1213 14:30:21.695095 1599 dynamic_cafile_content.go:174] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:30:21.721062 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:30:21.721231 systemd[1]: Stopped kubelet.service. Dec 13 14:30:21.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:21.723197 systemd[1]: Starting kubelet.service... Dec 13 14:30:21.803217 systemd[1]: Started kubelet.service. Dec 13 14:30:21.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:21.845425 kubelet[1936]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:30:21.845425 kubelet[1936]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:30:21.845425 kubelet[1936]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:30:21.845874 kubelet[1936]: I1213 14:30:21.845481 1936 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:30:21.852876 kubelet[1936]: I1213 14:30:21.852821 1936 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:30:21.853042 kubelet[1936]: I1213 14:30:21.853027 1936 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:30:21.853432 kubelet[1936]: I1213 14:30:21.853416 1936 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:30:21.854978 kubelet[1936]: I1213 14:30:21.854957 1936 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:30:21.858749 kubelet[1936]: I1213 14:30:21.858709 1936 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:30:21.864607 kubelet[1936]: E1213 14:30:21.864557 1936 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:30:21.865539 kubelet[1936]: I1213 14:30:21.864626 1936 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:30:21.868215 kubelet[1936]: I1213 14:30:21.868186 1936 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:30:21.868300 kubelet[1936]: I1213 14:30:21.868280 1936 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:30:21.868411 kubelet[1936]: I1213 14:30:21.868373 1936 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:30:21.868589 kubelet[1936]: I1213 14:30:21.868400 1936 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:30:21.868589 kubelet[1936]: I1213 14:30:21.868582 1936 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:30:21.868589 kubelet[1936]: I1213 14:30:21.868590 1936 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:30:21.868765 kubelet[1936]: I1213 14:30:21.868621 1936 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:30:21.868765 kubelet[1936]: I1213 14:30:21.868716 1936 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:30:21.868765 kubelet[1936]: I1213 14:30:21.868728 1936 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:30:21.868765 kubelet[1936]: I1213 14:30:21.868749 1936 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:30:21.868765 kubelet[1936]: I1213 14:30:21.868760 1936 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:30:21.870060 kubelet[1936]: I1213 14:30:21.870041 1936 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:30:21.870607 kubelet[1936]: I1213 14:30:21.870588 1936 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:30:21.871302 kubelet[1936]: I1213 14:30:21.871286 1936 server.go:1269] "Started kubelet" Dec 13 14:30:21.871719 kubelet[1936]: I1213 14:30:21.871638 1936 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:30:21.871896 kubelet[1936]: I1213 14:30:21.871822 1936 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:30:21.872196 kubelet[1936]: I1213 14:30:21.872180 1936 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:30:21.873753 kubelet[1936]: I1213 14:30:21.873712 1936 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:30:21.877551 kubelet[1936]: I1213 14:30:21.877522 1936 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:30:21.877630 kubelet[1936]: I1213 14:30:21.877556 1936 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:30:21.877630 kubelet[1936]: I1213 14:30:21.877581 1936 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:30:21.876000 audit[1936]: AVC avc: denied { mac_admin } for pid=1936 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.876000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:30:21.876000 audit[1936]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a15ec0 a1=c000d88528 a2=c000a15e90 a3=25 items=0 ppid=1 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:21.876000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:30:21.876000 audit[1936]: AVC avc: denied { mac_admin } for pid=1936 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.876000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:30:21.876000 audit[1936]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000da20c0 a1=c000d88540 a2=c000a15f50 a3=25 items=0 ppid=1 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:21.876000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:30:21.882656 kubelet[1936]: I1213 14:30:21.882626 1936 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:30:21.883956 kubelet[1936]: I1213 14:30:21.883928 1936 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:30:21.884061 kubelet[1936]: I1213 14:30:21.884048 1936 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:30:21.884189 kubelet[1936]: I1213 14:30:21.884163 1936 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:30:21.885148 kubelet[1936]: I1213 14:30:21.885124 1936 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:30:21.885238 kubelet[1936]: I1213 14:30:21.885193 1936 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:30:21.886831 kubelet[1936]: E1213 14:30:21.882676 1936 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:30:21.887689 kubelet[1936]: E1213 14:30:21.887598 1936 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:30:21.887894 kubelet[1936]: I1213 14:30:21.887870 1936 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:30:21.889409 kubelet[1936]: I1213 14:30:21.889297 1936 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:30:21.890356 kubelet[1936]: I1213 14:30:21.890332 1936 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:30:21.890356 kubelet[1936]: I1213 14:30:21.890361 1936 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:30:21.890467 kubelet[1936]: I1213 14:30:21.890383 1936 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:30:21.890467 kubelet[1936]: E1213 14:30:21.890424 1936 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:30:21.914934 kubelet[1936]: I1213 14:30:21.914899 1936 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:30:21.914934 kubelet[1936]: I1213 14:30:21.914923 1936 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:30:21.915179 kubelet[1936]: I1213 14:30:21.914960 1936 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:30:21.915381 kubelet[1936]: I1213 14:30:21.915356 1936 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:30:21.915411 kubelet[1936]: I1213 14:30:21.915376 1936 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:30:21.915411 kubelet[1936]: I1213 14:30:21.915399 1936 policy_none.go:49] "None policy: Start" Dec 13 14:30:21.915993 kubelet[1936]: I1213 14:30:21.915974 1936 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:30:21.915993 kubelet[1936]: I1213 14:30:21.915994 1936 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:30:21.916161 kubelet[1936]: I1213 14:30:21.916145 1936 state_mem.go:75] "Updated machine memory state" Dec 13 14:30:21.920626 kubelet[1936]: I1213 14:30:21.920605 1936 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:30:21.919000 audit[1936]: AVC avc: denied { mac_admin } for pid=1936 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:21.919000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:30:21.919000 audit[1936]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006077d0 a1=c0005dfd58 a2=c0006077a0 a3=25 items=0 ppid=1 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:21.919000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:30:21.920972 kubelet[1936]: I1213 14:30:21.920731 1936 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:30:21.921175 kubelet[1936]: I1213 14:30:21.921161 1936 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:30:21.921293 kubelet[1936]: I1213 14:30:21.921243 1936 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:30:21.921829 kubelet[1936]: I1213 14:30:21.921813 1936 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:30:22.026241 kubelet[1936]: I1213 14:30:22.026124 1936 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:30:22.032026 kubelet[1936]: I1213 14:30:22.031990 1936 kubelet_node_status.go:111] "Node was previously registered" node="localhost" Dec 13 14:30:22.032214 kubelet[1936]: I1213 14:30:22.032049 1936 kubelet_node_status.go:75] "Successfully registered node" node="localhost" Dec 13 14:30:22.085571 kubelet[1936]: I1213 14:30:22.085538 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/cb880e18749498f6aaa9e82420d5c181-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"cb880e18749498f6aaa9e82420d5c181\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:30:22.085571 kubelet[1936]: I1213 14:30:22.085574 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:30:22.085695 kubelet[1936]: I1213 14:30:22.085595 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:30:22.085695 kubelet[1936]: I1213 14:30:22.085609 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/cb880e18749498f6aaa9e82420d5c181-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"cb880e18749498f6aaa9e82420d5c181\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:30:22.085695 kubelet[1936]: I1213 14:30:22.085625 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/cb880e18749498f6aaa9e82420d5c181-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"cb880e18749498f6aaa9e82420d5c181\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:30:22.085695 kubelet[1936]: I1213 14:30:22.085641 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:30:22.085695 kubelet[1936]: I1213 14:30:22.085675 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:30:22.085818 kubelet[1936]: I1213 14:30:22.085691 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:30:22.085818 kubelet[1936]: I1213 14:30:22.085708 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a52b86ce975f496e6002ba953fa9b888-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"a52b86ce975f496e6002ba953fa9b888\") " pod="kube-system/kube-scheduler-localhost" Dec 13 14:30:22.298948 kubelet[1936]: E1213 14:30:22.298722 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:22.300881 kubelet[1936]: E1213 14:30:22.300817 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:22.300881 kubelet[1936]: E1213 14:30:22.300831 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:22.869456 kubelet[1936]: I1213 14:30:22.869413 1936 apiserver.go:52] "Watching apiserver" Dec 13 14:30:22.884499 kubelet[1936]: I1213 14:30:22.884448 1936 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:30:22.903124 kubelet[1936]: E1213 14:30:22.903094 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:22.903399 kubelet[1936]: E1213 14:30:22.903183 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:22.908917 kubelet[1936]: E1213 14:30:22.908868 1936 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Dec 13 14:30:22.909095 kubelet[1936]: E1213 14:30:22.909067 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:22.948703 kubelet[1936]: I1213 14:30:22.948587 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.948563945 podStartE2EDuration="1.948563945s" podCreationTimestamp="2024-12-13 14:30:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:30:22.928173014 +0000 UTC m=+1.121960558" watchObservedRunningTime="2024-12-13 14:30:22.948563945 +0000 UTC m=+1.142351488" Dec 13 14:30:22.973684 kubelet[1936]: I1213 14:30:22.973583 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.973560663 podStartE2EDuration="1.973560663s" podCreationTimestamp="2024-12-13 14:30:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:30:22.949405623 +0000 UTC m=+1.143193166" watchObservedRunningTime="2024-12-13 14:30:22.973560663 +0000 UTC m=+1.167348206" Dec 13 14:30:22.986503 kubelet[1936]: I1213 14:30:22.986315 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.9861863899999999 podStartE2EDuration="1.98618639s" podCreationTimestamp="2024-12-13 14:30:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:30:22.974587638 +0000 UTC m=+1.168375182" watchObservedRunningTime="2024-12-13 14:30:22.98618639 +0000 UTC m=+1.179973933" Dec 13 14:30:23.905438 kubelet[1936]: E1213 14:30:23.905391 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:23.910028 kubelet[1936]: E1213 14:30:23.909978 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:23.945000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:23.945000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00044a020 a2=fc6 a3=0 items=0 ppid=1674 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 key=(null) Dec 13 14:30:23.945000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:30:23.945000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:23.945000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00044a320 a2=fc6 a3=0 items=0 ppid=1674 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 key=(null) Dec 13 14:30:23.945000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:30:23.945000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:23.945000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000872d20 a2=fc6 a3=0 items=0 ppid=1674 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 key=(null) Dec 13 14:30:23.945000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:30:23.946000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:30:23.946000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b92d60 a2=fc6 a3=0 items=0 ppid=1674 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 key=(null) Dec 13 14:30:23.946000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:30:24.906395 kubelet[1936]: E1213 14:30:24.906338 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:26.339000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:30:26.341528 kernel: kauditd_printk_skb: 278 callbacks suppressed Dec 13 14:30:26.341584 kernel: audit: type=1400 audit(1734100226.339:805): avc: denied { watch } for pid=1816 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7322 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:30:26.339000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000555680 a2=fc6 a3=0 items=0 ppid=1674 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 key=(null) Dec 13 14:30:26.350240 kernel: audit: type=1300 audit(1734100226.339:805): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000555680 a2=fc6 a3=0 items=0 ppid=1674 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 key=(null) Dec 13 14:30:26.350293 kernel: audit: type=1327 audit(1734100226.339:805): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:30:26.339000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:30:26.644273 sudo[1341]: pam_unix(sudo:session): session closed for user root Dec 13 14:30:26.643000 audit[1341]: USER_END pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:30:26.643000 audit[1341]: CRED_DISP pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:30:26.648799 sshd[1337]: pam_unix(sshd:session): session closed for user core Dec 13 14:30:26.651475 systemd[1]: sshd@6-10.0.0.133:22-10.0.0.1:48754.service: Deactivated successfully. Dec 13 14:30:26.651871 kernel: audit: type=1106 audit(1734100226.643:806): pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:30:26.651942 kernel: audit: type=1104 audit(1734100226.643:807): pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:30:26.651984 kernel: audit: type=1106 audit(1734100226.647:808): pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:26.647000 audit[1337]: USER_END pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:26.652178 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:30:26.652335 systemd[1]: session-7.scope: Consumed 4.041s CPU time. Dec 13 14:30:26.652802 systemd-logind[1194]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:30:26.653740 systemd-logind[1194]: Removed session 7. Dec 13 14:30:26.647000 audit[1337]: CRED_DISP pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:26.660073 kernel: audit: type=1104 audit(1734100226.647:809): pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:26.660133 kernel: audit: type=1131 audit(1734100226.647:810): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.133:22-10.0.0.1:48754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:26.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.133:22-10.0.0.1:48754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:28.363289 kubelet[1936]: I1213 14:30:28.363217 1936 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:30:28.363799 kubelet[1936]: I1213 14:30:28.363789 1936 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:30:28.363880 env[1202]: time="2024-12-13T14:30:28.363620757Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:30:29.360190 systemd[1]: Created slice kubepods-besteffort-pod7d1aaa9c_f1d2_41d2_a880_f2ba7c9104fa.slice. Dec 13 14:30:29.435067 kubelet[1936]: I1213 14:30:29.435021 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7d1aaa9c-f1d2-41d2-a880-f2ba7c9104fa-xtables-lock\") pod \"kube-proxy-pb6mj\" (UID: \"7d1aaa9c-f1d2-41d2-a880-f2ba7c9104fa\") " pod="kube-system/kube-proxy-pb6mj" Dec 13 14:30:29.435067 kubelet[1936]: I1213 14:30:29.435056 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/7d1aaa9c-f1d2-41d2-a880-f2ba7c9104fa-kube-proxy\") pod \"kube-proxy-pb6mj\" (UID: \"7d1aaa9c-f1d2-41d2-a880-f2ba7c9104fa\") " pod="kube-system/kube-proxy-pb6mj" Dec 13 14:30:29.435067 kubelet[1936]: I1213 14:30:29.435071 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7d1aaa9c-f1d2-41d2-a880-f2ba7c9104fa-lib-modules\") pod \"kube-proxy-pb6mj\" (UID: \"7d1aaa9c-f1d2-41d2-a880-f2ba7c9104fa\") " pod="kube-system/kube-proxy-pb6mj" Dec 13 14:30:29.435067 kubelet[1936]: I1213 14:30:29.435085 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ctvxl\" (UniqueName: \"kubernetes.io/projected/7d1aaa9c-f1d2-41d2-a880-f2ba7c9104fa-kube-api-access-ctvxl\") pod \"kube-proxy-pb6mj\" (UID: \"7d1aaa9c-f1d2-41d2-a880-f2ba7c9104fa\") " pod="kube-system/kube-proxy-pb6mj" Dec 13 14:30:29.517402 systemd[1]: Created slice kubepods-besteffort-podcf347851_4c93_40b8_8e0e_695fd3d2c8a2.slice. Dec 13 14:30:29.536047 kubelet[1936]: I1213 14:30:29.535994 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/cf347851-4c93-40b8-8e0e-695fd3d2c8a2-var-lib-calico\") pod \"tigera-operator-76c4976dd7-xxc5s\" (UID: \"cf347851-4c93-40b8-8e0e-695fd3d2c8a2\") " pod="tigera-operator/tigera-operator-76c4976dd7-xxc5s" Dec 13 14:30:29.536047 kubelet[1936]: I1213 14:30:29.536037 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9vpqx\" (UniqueName: \"kubernetes.io/projected/cf347851-4c93-40b8-8e0e-695fd3d2c8a2-kube-api-access-9vpqx\") pod \"tigera-operator-76c4976dd7-xxc5s\" (UID: \"cf347851-4c93-40b8-8e0e-695fd3d2c8a2\") " pod="tigera-operator/tigera-operator-76c4976dd7-xxc5s" Dec 13 14:30:29.541064 kubelet[1936]: I1213 14:30:29.541040 1936 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 14:30:29.670828 kubelet[1936]: E1213 14:30:29.670729 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:29.671285 env[1202]: time="2024-12-13T14:30:29.671237932Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pb6mj,Uid:7d1aaa9c-f1d2-41d2-a880-f2ba7c9104fa,Namespace:kube-system,Attempt:0,}" Dec 13 14:30:29.686393 env[1202]: time="2024-12-13T14:30:29.686326356Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:30:29.686393 env[1202]: time="2024-12-13T14:30:29.686363667Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:30:29.686393 env[1202]: time="2024-12-13T14:30:29.686377885Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:30:29.686582 env[1202]: time="2024-12-13T14:30:29.686513202Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f1b434315ac808df0de2a52cecbaf05fe82b8ccf732fa4602074e15346b4cb03 pid=2032 runtime=io.containerd.runc.v2 Dec 13 14:30:29.699213 systemd[1]: Started cri-containerd-f1b434315ac808df0de2a52cecbaf05fe82b8ccf732fa4602074e15346b4cb03.scope. Dec 13 14:30:29.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.713390 kernel: audit: type=1400 audit(1734100229.706:811): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.713456 kernel: audit: type=1400 audit(1734100229.706:812): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.709000 audit: BPF prog-id=106 op=LOAD Dec 13 14:30:29.709000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.709000 audit[2041]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2032 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631623433343331356163383038646630646532613532636563626166 Dec 13 14:30:29.709000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.709000 audit[2041]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2032 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631623433343331356163383038646630646532613532636563626166 Dec 13 14:30:29.709000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.709000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.709000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.709000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.709000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.709000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.709000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.709000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.709000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.709000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.709000 audit: BPF prog-id=107 op=LOAD Dec 13 14:30:29.709000 audit[2041]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030cc50 items=0 ppid=2032 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631623433343331356163383038646630646532613532636563626166 Dec 13 14:30:29.713000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.713000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.713000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.713000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.713000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.713000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.713000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.713000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.713000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.713000 audit: BPF prog-id=108 op=LOAD Dec 13 14:30:29.713000 audit[2041]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030cc98 items=0 ppid=2032 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631623433343331356163383038646630646532613532636563626166 Dec 13 14:30:29.714000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:30:29.714000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:30:29.714000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.714000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.714000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.714000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.714000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.714000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.714000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.714000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.714000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.714000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.714000 audit: BPF prog-id=109 op=LOAD Dec 13 14:30:29.714000 audit[2041]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030d0a8 items=0 ppid=2032 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631623433343331356163383038646630646532613532636563626166 Dec 13 14:30:29.725464 env[1202]: time="2024-12-13T14:30:29.725416262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pb6mj,Uid:7d1aaa9c-f1d2-41d2-a880-f2ba7c9104fa,Namespace:kube-system,Attempt:0,} returns sandbox id \"f1b434315ac808df0de2a52cecbaf05fe82b8ccf732fa4602074e15346b4cb03\"" Dec 13 14:30:29.726042 kubelet[1936]: E1213 14:30:29.726005 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:29.728549 env[1202]: time="2024-12-13T14:30:29.728516545Z" level=info msg="CreateContainer within sandbox \"f1b434315ac808df0de2a52cecbaf05fe82b8ccf732fa4602074e15346b4cb03\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:30:29.744160 env[1202]: time="2024-12-13T14:30:29.744085185Z" level=info msg="CreateContainer within sandbox \"f1b434315ac808df0de2a52cecbaf05fe82b8ccf732fa4602074e15346b4cb03\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9d10be392ebfd0dee48c28e5dec51d6288647754fbb59f77c5e842f6df546bd5\"" Dec 13 14:30:29.744778 env[1202]: time="2024-12-13T14:30:29.744739794Z" level=info msg="StartContainer for \"9d10be392ebfd0dee48c28e5dec51d6288647754fbb59f77c5e842f6df546bd5\"" Dec 13 14:30:29.760211 systemd[1]: Started cri-containerd-9d10be392ebfd0dee48c28e5dec51d6288647754fbb59f77c5e842f6df546bd5.scope. Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3f712a1cc8 items=0 ppid=2032 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964313062653339326562666430646565343863323865356465633531 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit: BPF prog-id=110 op=LOAD Dec 13 14:30:29.773000 audit[2074]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00028d208 items=0 ppid=2032 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964313062653339326562666430646565343863323865356465633531 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit: BPF prog-id=111 op=LOAD Dec 13 14:30:29.773000 audit[2074]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00028d258 items=0 ppid=2032 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964313062653339326562666430646565343863323865356465633531 Dec 13 14:30:29.773000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:30:29.773000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { perfmon } for pid=2074 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit[2074]: AVC avc: denied { bpf } for pid=2074 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.773000 audit: BPF prog-id=112 op=LOAD Dec 13 14:30:29.773000 audit[2074]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00028d2e8 items=0 ppid=2032 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964313062653339326562666430646565343863323865356465633531 Dec 13 14:30:29.787407 env[1202]: time="2024-12-13T14:30:29.787350593Z" level=info msg="StartContainer for \"9d10be392ebfd0dee48c28e5dec51d6288647754fbb59f77c5e842f6df546bd5\" returns successfully" Dec 13 14:30:29.820576 env[1202]: time="2024-12-13T14:30:29.820533625Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-xxc5s,Uid:cf347851-4c93-40b8-8e0e-695fd3d2c8a2,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:30:29.837622 env[1202]: time="2024-12-13T14:30:29.837534577Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:30:29.837622 env[1202]: time="2024-12-13T14:30:29.837578942Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:30:29.837622 env[1202]: time="2024-12-13T14:30:29.837589762Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:30:29.837992 env[1202]: time="2024-12-13T14:30:29.837923318Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/852fe1e054b4cae6dab915e019e13d5069f20a4412b80d04c8fe9aef2d1e2768 pid=2115 runtime=io.containerd.runc.v2 Dec 13 14:30:29.849689 systemd[1]: Started cri-containerd-852fe1e054b4cae6dab915e019e13d5069f20a4412b80d04c8fe9aef2d1e2768.scope. Dec 13 14:30:29.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.859000 audit: BPF prog-id=113 op=LOAD Dec 13 14:30:29.859000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.859000 audit[2126]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2115 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835326665316530353462346361653664616239313565303139653133 Dec 13 14:30:29.859000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.859000 audit[2126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2115 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835326665316530353462346361653664616239313565303139653133 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit: BPF prog-id=114 op=LOAD Dec 13 14:30:29.860000 audit[2126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00024c710 items=0 ppid=2115 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835326665316530353462346361653664616239313565303139653133 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit: BPF prog-id=115 op=LOAD Dec 13 14:30:29.860000 audit[2126]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00024c758 items=0 ppid=2115 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835326665316530353462346361653664616239313565303139653133 Dec 13 14:30:29.860000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:30:29.860000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { perfmon } for pid=2126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit[2126]: AVC avc: denied { bpf } for pid=2126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:29.860000 audit: BPF prog-id=116 op=LOAD Dec 13 14:30:29.860000 audit[2126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00024cb68 items=0 ppid=2115 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835326665316530353462346361653664616239313565303139653133 Dec 13 14:30:29.884590 env[1202]: time="2024-12-13T14:30:29.884536933Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-xxc5s,Uid:cf347851-4c93-40b8-8e0e-695fd3d2c8a2,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"852fe1e054b4cae6dab915e019e13d5069f20a4412b80d04c8fe9aef2d1e2768\"" Dec 13 14:30:29.884000 audit[2175]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:29.884000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9f6f1c30 a2=0 a3=7ffd9f6f1c1c items=0 ppid=2085 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:30:29.886113 env[1202]: time="2024-12-13T14:30:29.886082310Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:30:29.885000 audit[2176]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:29.885000 audit[2176]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5f900a90 a2=0 a3=7ffd5f900a7c items=0 ppid=2085 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.885000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:30:29.886000 audit[2177]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2177 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:29.886000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce4297180 a2=0 a3=7ffce429716c items=0 ppid=2085 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.886000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:30:29.887000 audit[2178]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:29.887000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff00a54430 a2=0 a3=7fff00a5441c items=0 ppid=2085 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.887000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:30:29.892000 audit[2179]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:29.892000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0cc66ee0 a2=0 a3=7ffd0cc66ecc items=0 ppid=2085 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.892000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:30:29.893000 audit[2180]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:29.893000 audit[2180]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9bf0ace0 a2=0 a3=7ffd9bf0accc items=0 ppid=2085 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.893000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:30:29.914258 kubelet[1936]: E1213 14:30:29.914068 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:29.923892 kubelet[1936]: I1213 14:30:29.922240 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-pb6mj" podStartSLOduration=0.92222781 podStartE2EDuration="922.22781ms" podCreationTimestamp="2024-12-13 14:30:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:30:29.922105547 +0000 UTC m=+8.115893090" watchObservedRunningTime="2024-12-13 14:30:29.92222781 +0000 UTC m=+8.116015353" Dec 13 14:30:29.987000 audit[2181]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:29.987000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe4354b010 a2=0 a3=7ffe4354affc items=0 ppid=2085 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.987000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:30:29.989000 audit[2183]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:29.989000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffafa663f0 a2=0 a3=7fffafa663dc items=0 ppid=2085 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.989000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:30:29.993000 audit[2186]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:29.993000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe1a61cdd0 a2=0 a3=7ffe1a61cdbc items=0 ppid=2085 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.993000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:30:29.994000 audit[2187]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:29.994000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff64dd67f0 a2=0 a3=7fff64dd67dc items=0 ppid=2085 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.994000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:30:29.996000 audit[2189]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:29.996000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe47c485b0 a2=0 a3=7ffe47c4859c items=0 ppid=2085 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.996000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:30:29.997000 audit[2190]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:29.997000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff191541e0 a2=0 a3=7fff191541cc items=0 ppid=2085 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:29.997000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:30:30.000000 audit[2192]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:30.000000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd4b67c750 a2=0 a3=7ffd4b67c73c items=0 ppid=2085 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.000000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:30:30.003000 audit[2195]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:30.003000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffed6a68e50 a2=0 a3=7ffed6a68e3c items=0 ppid=2085 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.003000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:30:30.004000 audit[2196]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:30.004000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6a7851b0 a2=0 a3=7ffc6a78519c items=0 ppid=2085 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:30:30.006000 audit[2198]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:30.006000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff78b10f90 a2=0 a3=7fff78b10f7c items=0 ppid=2085 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.006000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:30:30.007000 audit[2199]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:30.007000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff74bd7560 a2=0 a3=7fff74bd754c items=0 ppid=2085 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.007000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:30:30.009000 audit[2201]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:30.009000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffda946ef80 a2=0 a3=7ffda946ef6c items=0 ppid=2085 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.009000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:30:30.012000 audit[2204]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:30.012000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc5c71ece0 a2=0 a3=7ffc5c71eccc items=0 ppid=2085 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.012000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:30:30.015000 audit[2207]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:30.015000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe9cdbf110 a2=0 a3=7ffe9cdbf0fc items=0 ppid=2085 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.015000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:30:30.016000 audit[2208]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:30.016000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffedf94a850 a2=0 a3=7ffedf94a83c items=0 ppid=2085 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:30:30.018000 audit[2210]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:30.018000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffff4151b00 a2=0 a3=7ffff4151aec items=0 ppid=2085 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.018000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:30:30.021000 audit[2213]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:30.021000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe1f32abd0 a2=0 a3=7ffe1f32abbc items=0 ppid=2085 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.021000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:30:30.022000 audit[2214]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:30.022000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca459f980 a2=0 a3=7ffca459f96c items=0 ppid=2085 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.022000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:30:30.024000 audit[2216]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:30:30.024000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd03345d00 a2=0 a3=7ffd03345cec items=0 ppid=2085 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.024000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:30:30.045000 audit[2222]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:30.045000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff331d3ec0 a2=0 a3=7fff331d3eac items=0 ppid=2085 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.045000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:30.055000 audit[2222]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:30.055000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff331d3ec0 a2=0 a3=7fff331d3eac items=0 ppid=2085 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.055000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:30.056000 audit[2227]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.056000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd9fec6830 a2=0 a3=7ffd9fec681c items=0 ppid=2085 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.056000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:30:30.058000 audit[2229]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.058000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc37287a90 a2=0 a3=7ffc37287a7c items=0 ppid=2085 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.058000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:30:30.061000 audit[2232]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.061000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd34ed4cb0 a2=0 a3=7ffd34ed4c9c items=0 ppid=2085 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.061000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:30:30.062000 audit[2233]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.062000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc432a4140 a2=0 a3=7ffc432a412c items=0 ppid=2085 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.062000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:30:30.064000 audit[2235]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.064000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd9e5c7d80 a2=0 a3=7ffd9e5c7d6c items=0 ppid=2085 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.064000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:30:30.065000 audit[2236]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.065000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9fc69690 a2=0 a3=7ffe9fc6967c items=0 ppid=2085 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.065000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:30:30.067000 audit[2238]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.067000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe980e4aa0 a2=0 a3=7ffe980e4a8c items=0 ppid=2085 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.067000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:30:30.070000 audit[2241]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.070000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe76456cc0 a2=0 a3=7ffe76456cac items=0 ppid=2085 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.070000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:30:30.071000 audit[2242]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.071000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf46d5a90 a2=0 a3=7ffcf46d5a7c items=0 ppid=2085 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:30:30.073000 audit[2244]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.073000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd7d686110 a2=0 a3=7ffd7d6860fc items=0 ppid=2085 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.073000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:30:30.074000 audit[2245]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.074000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff121d38c0 a2=0 a3=7fff121d38ac items=0 ppid=2085 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.074000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:30:30.076000 audit[2247]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.076000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff29a87af0 a2=0 a3=7fff29a87adc items=0 ppid=2085 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.076000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:30:30.080000 audit[2250]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.080000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc36e9e040 a2=0 a3=7ffc36e9e02c items=0 ppid=2085 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.080000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:30:30.083000 audit[2253]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.083000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff7fd393c0 a2=0 a3=7fff7fd393ac items=0 ppid=2085 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.083000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:30:30.084000 audit[2254]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.084000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd8f462130 a2=0 a3=7ffd8f46211c items=0 ppid=2085 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.084000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:30:30.086000 audit[2256]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.086000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe09aba550 a2=0 a3=7ffe09aba53c items=0 ppid=2085 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.086000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:30:30.089000 audit[2259]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.089000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc85c002c0 a2=0 a3=7ffc85c002ac items=0 ppid=2085 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.089000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:30:30.090000 audit[2260]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.090000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeaa1d86a0 a2=0 a3=7ffeaa1d868c items=0 ppid=2085 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.090000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:30:30.092000 audit[2262]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.092000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffe32b15c0 a2=0 a3=7fffe32b15ac items=0 ppid=2085 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.092000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:30:30.093000 audit[2263]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.093000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc59cd68c0 a2=0 a3=7ffc59cd68ac items=0 ppid=2085 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.093000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:30:30.095000 audit[2265]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.095000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcbe3108e0 a2=0 a3=7ffcbe3108cc items=0 ppid=2085 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.095000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:30:30.098000 audit[2268]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:30:30.098000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff1d38e240 a2=0 a3=7fff1d38e22c items=0 ppid=2085 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.098000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:30:30.101000 audit[2270]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:30:30.101000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff70e19560 a2=0 a3=7fff70e1954c items=0 ppid=2085 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.101000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:30.101000 audit[2270]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:30:30.101000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff70e19560 a2=0 a3=7fff70e1954c items=0 ppid=2085 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:30.101000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:31.041492 kubelet[1936]: E1213 14:30:31.041447 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:31.916192 kubelet[1936]: E1213 14:30:31.916155 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:32.548038 kubelet[1936]: E1213 14:30:32.547993 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:33.159310 kubelet[1936]: E1213 14:30:33.159279 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:33.919767 kubelet[1936]: E1213 14:30:33.919714 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:35.368196 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount181491828.mount: Deactivated successfully. Dec 13 14:30:36.054987 env[1202]: time="2024-12-13T14:30:36.054922051Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:36.056658 env[1202]: time="2024-12-13T14:30:36.056605882Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:36.058139 env[1202]: time="2024-12-13T14:30:36.058089605Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:36.059429 env[1202]: time="2024-12-13T14:30:36.059391372Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:36.060318 env[1202]: time="2024-12-13T14:30:36.059822209Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 14:30:36.062231 env[1202]: time="2024-12-13T14:30:36.062182502Z" level=info msg="CreateContainer within sandbox \"852fe1e054b4cae6dab915e019e13d5069f20a4412b80d04c8fe9aef2d1e2768\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:30:36.073356 env[1202]: time="2024-12-13T14:30:36.073310616Z" level=info msg="CreateContainer within sandbox \"852fe1e054b4cae6dab915e019e13d5069f20a4412b80d04c8fe9aef2d1e2768\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"44333a255d2c518e486a49b42b81e546366dde50cf960f52a1bc16acd95b50ed\"" Dec 13 14:30:36.073790 env[1202]: time="2024-12-13T14:30:36.073763314Z" level=info msg="StartContainer for \"44333a255d2c518e486a49b42b81e546366dde50cf960f52a1bc16acd95b50ed\"" Dec 13 14:30:36.086375 systemd[1]: Started cri-containerd-44333a255d2c518e486a49b42b81e546366dde50cf960f52a1bc16acd95b50ed.scope. Dec 13 14:30:36.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.101654 kernel: kauditd_printk_skb: 308 callbacks suppressed Dec 13 14:30:36.101716 kernel: audit: type=1400 audit(1734100236.098:904): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.109212 kernel: audit: type=1400 audit(1734100236.098:905): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.109300 kernel: audit: type=1400 audit(1734100236.098:906): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.119952 kernel: audit: type=1400 audit(1734100236.098:907): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.120011 kernel: audit: type=1400 audit(1734100236.098:908): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.127896 kernel: audit: type=1400 audit(1734100236.098:909): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.127978 kernel: audit: type=1400 audit(1734100236.098:910): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.128012 kernel: audit: type=1400 audit(1734100236.098:911): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.134235 kernel: audit: type=1400 audit(1734100236.098:912): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.137881 kernel: audit: type=1400 audit(1734100236.102:913): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.102000 audit: BPF prog-id=117 op=LOAD Dec 13 14:30:36.103000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.103000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2115 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:36.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434333333613235356432633531386534383661343962343262383165 Dec 13 14:30:36.103000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.103000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2115 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:36.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434333333613235356432633531386534383661343962343262383165 Dec 13 14:30:36.103000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.103000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.103000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.103000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.103000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.103000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.103000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.103000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.103000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.103000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.103000 audit: BPF prog-id=118 op=LOAD Dec 13 14:30:36.103000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032ad20 items=0 ppid=2115 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:36.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434333333613235356432633531386534383661343962343262383165 Dec 13 14:30:36.107000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.107000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.107000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.107000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.107000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.107000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.107000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.107000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.107000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.107000 audit: BPF prog-id=119 op=LOAD Dec 13 14:30:36.107000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032ad68 items=0 ppid=2115 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:36.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434333333613235356432633531386534383661343962343262383165 Dec 13 14:30:36.110000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:30:36.110000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:30:36.110000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.110000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.110000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.110000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.110000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.110000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.110000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.110000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.110000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.110000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:36.110000 audit: BPF prog-id=120 op=LOAD Dec 13 14:30:36.110000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032b178 items=0 ppid=2115 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:36.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434333333613235356432633531386534383661343962343262383165 Dec 13 14:30:36.237305 env[1202]: time="2024-12-13T14:30:36.237230210Z" level=info msg="StartContainer for \"44333a255d2c518e486a49b42b81e546366dde50cf960f52a1bc16acd95b50ed\" returns successfully" Dec 13 14:30:36.933246 kubelet[1936]: I1213 14:30:36.933170 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4976dd7-xxc5s" podStartSLOduration=1.7579608389999999 podStartE2EDuration="7.933153109s" podCreationTimestamp="2024-12-13 14:30:29 +0000 UTC" firstStartedPulling="2024-12-13 14:30:29.885470833 +0000 UTC m=+8.079258376" lastFinishedPulling="2024-12-13 14:30:36.060663103 +0000 UTC m=+14.254450646" observedRunningTime="2024-12-13 14:30:36.932993867 +0000 UTC m=+15.126781410" watchObservedRunningTime="2024-12-13 14:30:36.933153109 +0000 UTC m=+15.126940652" Dec 13 14:30:37.622501 update_engine[1196]: I1213 14:30:37.622440 1196 update_attempter.cc:509] Updating boot flags... Dec 13 14:30:38.936000 audit[2327]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:38.936000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffde42edbd0 a2=0 a3=7ffde42edbbc items=0 ppid=2085 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:38.936000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:38.942000 audit[2327]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:38.942000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffde42edbd0 a2=0 a3=0 items=0 ppid=2085 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:38.942000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:38.958000 audit[2329]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:38.958000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc5bec3f60 a2=0 a3=7ffc5bec3f4c items=0 ppid=2085 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:38.958000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:38.964000 audit[2329]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:38.964000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc5bec3f60 a2=0 a3=0 items=0 ppid=2085 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:38.964000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:39.071514 systemd[1]: Created slice kubepods-besteffort-podc1ef3eee_59dd_4b89_b8e1_2d4bbb896fc6.slice. Dec 13 14:30:39.200527 kubelet[1936]: I1213 14:30:39.200385 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c1ef3eee-59dd-4b89-b8e1-2d4bbb896fc6-tigera-ca-bundle\") pod \"calico-typha-7764d7cc5b-mxn2s\" (UID: \"c1ef3eee-59dd-4b89-b8e1-2d4bbb896fc6\") " pod="calico-system/calico-typha-7764d7cc5b-mxn2s" Dec 13 14:30:39.200527 kubelet[1936]: I1213 14:30:39.200424 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/c1ef3eee-59dd-4b89-b8e1-2d4bbb896fc6-typha-certs\") pod \"calico-typha-7764d7cc5b-mxn2s\" (UID: \"c1ef3eee-59dd-4b89-b8e1-2d4bbb896fc6\") " pod="calico-system/calico-typha-7764d7cc5b-mxn2s" Dec 13 14:30:39.200527 kubelet[1936]: I1213 14:30:39.200442 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vb4c5\" (UniqueName: \"kubernetes.io/projected/c1ef3eee-59dd-4b89-b8e1-2d4bbb896fc6-kube-api-access-vb4c5\") pod \"calico-typha-7764d7cc5b-mxn2s\" (UID: \"c1ef3eee-59dd-4b89-b8e1-2d4bbb896fc6\") " pod="calico-system/calico-typha-7764d7cc5b-mxn2s" Dec 13 14:30:39.260519 systemd[1]: Created slice kubepods-besteffort-podbab07e1c_a944_4127_8061_98b2db303c4c.slice. Dec 13 14:30:39.294464 kubelet[1936]: E1213 14:30:39.294376 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2zzf8" podUID="70b747ec-d344-4421-ac6c-6b613f04fea5" Dec 13 14:30:39.375750 kubelet[1936]: E1213 14:30:39.375688 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:39.376345 env[1202]: time="2024-12-13T14:30:39.376289629Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7764d7cc5b-mxn2s,Uid:c1ef3eee-59dd-4b89-b8e1-2d4bbb896fc6,Namespace:calico-system,Attempt:0,}" Dec 13 14:30:39.402765 env[1202]: time="2024-12-13T14:30:39.401368968Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:30:39.402765 env[1202]: time="2024-12-13T14:30:39.401407712Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:30:39.402765 env[1202]: time="2024-12-13T14:30:39.401417881Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:30:39.402765 env[1202]: time="2024-12-13T14:30:39.401592010Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2635cb4c05577f90c526a42050089e9e501628c7821978c4a250c9001ac3d25b pid=2340 runtime=io.containerd.runc.v2 Dec 13 14:30:39.403082 kubelet[1936]: I1213 14:30:39.401987 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bab07e1c-a944-4127-8061-98b2db303c4c-tigera-ca-bundle\") pod \"calico-node-fqztt\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " pod="calico-system/calico-node-fqztt" Dec 13 14:30:39.403082 kubelet[1936]: I1213 14:30:39.402024 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/70b747ec-d344-4421-ac6c-6b613f04fea5-varrun\") pod \"csi-node-driver-2zzf8\" (UID: \"70b747ec-d344-4421-ac6c-6b613f04fea5\") " pod="calico-system/csi-node-driver-2zzf8" Dec 13 14:30:39.403082 kubelet[1936]: I1213 14:30:39.402047 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-xtables-lock\") pod \"calico-node-fqztt\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " pod="calico-system/calico-node-fqztt" Dec 13 14:30:39.403082 kubelet[1936]: I1213 14:30:39.402065 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-policysync\") pod \"calico-node-fqztt\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " pod="calico-system/calico-node-fqztt" Dec 13 14:30:39.403082 kubelet[1936]: I1213 14:30:39.402084 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-flexvol-driver-host\") pod \"calico-node-fqztt\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " pod="calico-system/calico-node-fqztt" Dec 13 14:30:39.403284 kubelet[1936]: I1213 14:30:39.402104 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/70b747ec-d344-4421-ac6c-6b613f04fea5-kubelet-dir\") pod \"csi-node-driver-2zzf8\" (UID: \"70b747ec-d344-4421-ac6c-6b613f04fea5\") " pod="calico-system/csi-node-driver-2zzf8" Dec 13 14:30:39.403284 kubelet[1936]: I1213 14:30:39.402120 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d8g9c\" (UniqueName: \"kubernetes.io/projected/70b747ec-d344-4421-ac6c-6b613f04fea5-kube-api-access-d8g9c\") pod \"csi-node-driver-2zzf8\" (UID: \"70b747ec-d344-4421-ac6c-6b613f04fea5\") " pod="calico-system/csi-node-driver-2zzf8" Dec 13 14:30:39.403284 kubelet[1936]: I1213 14:30:39.402135 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-cni-bin-dir\") pod \"calico-node-fqztt\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " pod="calico-system/calico-node-fqztt" Dec 13 14:30:39.403284 kubelet[1936]: I1213 14:30:39.402150 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-cni-net-dir\") pod \"calico-node-fqztt\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " pod="calico-system/calico-node-fqztt" Dec 13 14:30:39.403284 kubelet[1936]: I1213 14:30:39.402163 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-var-run-calico\") pod \"calico-node-fqztt\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " pod="calico-system/calico-node-fqztt" Dec 13 14:30:39.403475 kubelet[1936]: I1213 14:30:39.402176 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-var-lib-calico\") pod \"calico-node-fqztt\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " pod="calico-system/calico-node-fqztt" Dec 13 14:30:39.403475 kubelet[1936]: I1213 14:30:39.402192 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-cni-log-dir\") pod \"calico-node-fqztt\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " pod="calico-system/calico-node-fqztt" Dec 13 14:30:39.403475 kubelet[1936]: I1213 14:30:39.402205 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wz7f2\" (UniqueName: \"kubernetes.io/projected/bab07e1c-a944-4127-8061-98b2db303c4c-kube-api-access-wz7f2\") pod \"calico-node-fqztt\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " pod="calico-system/calico-node-fqztt" Dec 13 14:30:39.403475 kubelet[1936]: I1213 14:30:39.402218 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/70b747ec-d344-4421-ac6c-6b613f04fea5-socket-dir\") pod \"csi-node-driver-2zzf8\" (UID: \"70b747ec-d344-4421-ac6c-6b613f04fea5\") " pod="calico-system/csi-node-driver-2zzf8" Dec 13 14:30:39.403475 kubelet[1936]: I1213 14:30:39.402230 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/70b747ec-d344-4421-ac6c-6b613f04fea5-registration-dir\") pod \"csi-node-driver-2zzf8\" (UID: \"70b747ec-d344-4421-ac6c-6b613f04fea5\") " pod="calico-system/csi-node-driver-2zzf8" Dec 13 14:30:39.403657 kubelet[1936]: I1213 14:30:39.402243 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-lib-modules\") pod \"calico-node-fqztt\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " pod="calico-system/calico-node-fqztt" Dec 13 14:30:39.403657 kubelet[1936]: I1213 14:30:39.402266 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/bab07e1c-a944-4127-8061-98b2db303c4c-node-certs\") pod \"calico-node-fqztt\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " pod="calico-system/calico-node-fqztt" Dec 13 14:30:39.417722 systemd[1]: Started cri-containerd-2635cb4c05577f90c526a42050089e9e501628c7821978c4a250c9001ac3d25b.scope. Dec 13 14:30:39.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.431000 audit: BPF prog-id=121 op=LOAD Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2340 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:39.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236333563623463303535373766393063353236613432303530303839 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2340 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:39.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236333563623463303535373766393063353236613432303530303839 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit: BPF prog-id=122 op=LOAD Dec 13 14:30:39.432000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002877d0 items=0 ppid=2340 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:39.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236333563623463303535373766393063353236613432303530303839 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit: BPF prog-id=123 op=LOAD Dec 13 14:30:39.432000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000287818 items=0 ppid=2340 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:39.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236333563623463303535373766393063353236613432303530303839 Dec 13 14:30:39.432000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:30:39.432000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { perfmon } for pid=2349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit[2349]: AVC avc: denied { bpf } for pid=2349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.432000 audit: BPF prog-id=124 op=LOAD Dec 13 14:30:39.432000 audit[2349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000287c28 items=0 ppid=2340 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:39.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236333563623463303535373766393063353236613432303530303839 Dec 13 14:30:39.462335 env[1202]: time="2024-12-13T14:30:39.462197985Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7764d7cc5b-mxn2s,Uid:c1ef3eee-59dd-4b89-b8e1-2d4bbb896fc6,Namespace:calico-system,Attempt:0,} returns sandbox id \"2635cb4c05577f90c526a42050089e9e501628c7821978c4a250c9001ac3d25b\"" Dec 13 14:30:39.462927 kubelet[1936]: E1213 14:30:39.462894 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:39.471153 env[1202]: time="2024-12-13T14:30:39.471117711Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:30:39.504979 kubelet[1936]: E1213 14:30:39.504660 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:39.504979 kubelet[1936]: W1213 14:30:39.504684 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:39.504979 kubelet[1936]: E1213 14:30:39.504715 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:39.506870 kubelet[1936]: E1213 14:30:39.506533 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:39.506870 kubelet[1936]: W1213 14:30:39.506550 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:39.506870 kubelet[1936]: E1213 14:30:39.506562 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:39.511132 kubelet[1936]: E1213 14:30:39.511114 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:39.511132 kubelet[1936]: W1213 14:30:39.511129 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:39.511266 kubelet[1936]: E1213 14:30:39.511154 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:39.511410 kubelet[1936]: E1213 14:30:39.511383 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:39.511410 kubelet[1936]: W1213 14:30:39.511397 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:39.511502 kubelet[1936]: E1213 14:30:39.511410 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:39.563618 kubelet[1936]: E1213 14:30:39.563575 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:39.564157 env[1202]: time="2024-12-13T14:30:39.564102186Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fqztt,Uid:bab07e1c-a944-4127-8061-98b2db303c4c,Namespace:calico-system,Attempt:0,}" Dec 13 14:30:39.674346 env[1202]: time="2024-12-13T14:30:39.674253499Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:30:39.674346 env[1202]: time="2024-12-13T14:30:39.674292512Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:30:39.674346 env[1202]: time="2024-12-13T14:30:39.674303063Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:30:39.674577 env[1202]: time="2024-12-13T14:30:39.674436606Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a pid=2387 runtime=io.containerd.runc.v2 Dec 13 14:30:39.687359 systemd[1]: Started cri-containerd-a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a.scope. Dec 13 14:30:39.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.696000 audit: BPF prog-id=125 op=LOAD Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2387 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:39.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133376361306135336363323538343866366662623034323738313766 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2387 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:39.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133376361306135336363323538343866366662623034323738313766 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit: BPF prog-id=126 op=LOAD Dec 13 14:30:39.697000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003741b0 items=0 ppid=2387 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:39.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133376361306135336363323538343866366662623034323738313766 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit: BPF prog-id=127 op=LOAD Dec 13 14:30:39.697000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003741f8 items=0 ppid=2387 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:39.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133376361306135336363323538343866366662623034323738313766 Dec 13 14:30:39.697000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:30:39.697000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:39.697000 audit: BPF prog-id=128 op=LOAD Dec 13 14:30:39.697000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000374608 items=0 ppid=2387 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:39.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133376361306135336363323538343866366662623034323738313766 Dec 13 14:30:39.710519 env[1202]: time="2024-12-13T14:30:39.710464129Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fqztt,Uid:bab07e1c-a944-4127-8061-98b2db303c4c,Namespace:calico-system,Attempt:0,} returns sandbox id \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\"" Dec 13 14:30:39.714703 kubelet[1936]: E1213 14:30:39.712955 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:39.977000 audit[2422]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:39.977000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffdee360c00 a2=0 a3=7ffdee360bec items=0 ppid=2085 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:39.977000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:39.981000 audit[2422]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:39.981000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdee360c00 a2=0 a3=0 items=0 ppid=2085 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:39.981000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:40.891313 kubelet[1936]: E1213 14:30:40.891253 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2zzf8" podUID="70b747ec-d344-4421-ac6c-6b613f04fea5" Dec 13 14:30:41.289701 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2870925179.mount: Deactivated successfully. Dec 13 14:30:42.419518 env[1202]: time="2024-12-13T14:30:42.419461008Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:42.421364 env[1202]: time="2024-12-13T14:30:42.421318798Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:42.422813 env[1202]: time="2024-12-13T14:30:42.422771903Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:42.424219 env[1202]: time="2024-12-13T14:30:42.424189991Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:42.424612 env[1202]: time="2024-12-13T14:30:42.424586951Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:30:42.425796 env[1202]: time="2024-12-13T14:30:42.425748816Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:30:42.431122 env[1202]: time="2024-12-13T14:30:42.431082412Z" level=info msg="CreateContainer within sandbox \"2635cb4c05577f90c526a42050089e9e501628c7821978c4a250c9001ac3d25b\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:30:42.443104 env[1202]: time="2024-12-13T14:30:42.443058344Z" level=info msg="CreateContainer within sandbox \"2635cb4c05577f90c526a42050089e9e501628c7821978c4a250c9001ac3d25b\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"8c31646c809735d58e28288176795b217661ba6974da23632be233dbdd06c7af\"" Dec 13 14:30:42.443526 env[1202]: time="2024-12-13T14:30:42.443476935Z" level=info msg="StartContainer for \"8c31646c809735d58e28288176795b217661ba6974da23632be233dbdd06c7af\"" Dec 13 14:30:42.456609 systemd[1]: Started cri-containerd-8c31646c809735d58e28288176795b217661ba6974da23632be233dbdd06c7af.scope. Dec 13 14:30:42.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.468717 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 14:30:42.468778 kernel: audit: type=1400 audit(1734100242.466:964): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.474672 kernel: audit: type=1400 audit(1734100242.466:965): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.474720 kernel: audit: type=1400 audit(1734100242.466:966): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.480397 kernel: audit: type=1400 audit(1734100242.466:967): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.480446 kernel: audit: type=1400 audit(1734100242.466:968): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.483311 kernel: audit: type=1400 audit(1734100242.466:969): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.486316 kernel: audit: type=1400 audit(1734100242.466:970): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.492078 kernel: audit: type=1400 audit(1734100242.466:971): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.495074 kernel: audit: type=1400 audit(1734100242.466:972): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.495118 kernel: audit: type=1400 audit(1734100242.470:973): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.470000 audit: BPF prog-id=129 op=LOAD Dec 13 14:30:42.471000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.471000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2340 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863333136343663383039373335643538653238323838313736373935 Dec 13 14:30:42.471000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.471000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2340 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863333136343663383039373335643538653238323838313736373935 Dec 13 14:30:42.471000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.471000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.471000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.471000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.471000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.471000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.471000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.471000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.471000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.471000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.471000 audit: BPF prog-id=130 op=LOAD Dec 13 14:30:42.471000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000321990 items=0 ppid=2340 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863333136343663383039373335643538653238323838313736373935 Dec 13 14:30:42.476000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.476000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.476000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.476000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.476000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.476000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.476000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.476000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.476000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.476000 audit: BPF prog-id=131 op=LOAD Dec 13 14:30:42.476000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003219d8 items=0 ppid=2340 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863333136343663383039373335643538653238323838313736373935 Dec 13 14:30:42.482000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:30:42.482000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:30:42.482000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.482000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.482000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.482000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.482000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.482000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.482000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.482000 audit[2433]: AVC avc: denied { perfmon } for pid=2433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.482000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.482000 audit[2433]: AVC avc: denied { bpf } for pid=2433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:42.482000 audit: BPF prog-id=132 op=LOAD Dec 13 14:30:42.482000 audit[2433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000321de8 items=0 ppid=2340 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863333136343663383039373335643538653238323838313736373935 Dec 13 14:30:42.522415 env[1202]: time="2024-12-13T14:30:42.522355922Z" level=info msg="StartContainer for \"8c31646c809735d58e28288176795b217661ba6974da23632be233dbdd06c7af\" returns successfully" Dec 13 14:30:42.891082 kubelet[1936]: E1213 14:30:42.891036 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2zzf8" podUID="70b747ec-d344-4421-ac6c-6b613f04fea5" Dec 13 14:30:42.940115 kubelet[1936]: E1213 14:30:42.940084 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:42.960337 kubelet[1936]: I1213 14:30:42.959071 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7764d7cc5b-mxn2s" podStartSLOduration=1.004395759 podStartE2EDuration="3.959054016s" podCreationTimestamp="2024-12-13 14:30:39 +0000 UTC" firstStartedPulling="2024-12-13 14:30:39.470881825 +0000 UTC m=+17.664669368" lastFinishedPulling="2024-12-13 14:30:42.425540082 +0000 UTC m=+20.619327625" observedRunningTime="2024-12-13 14:30:42.948506461 +0000 UTC m=+21.142294004" watchObservedRunningTime="2024-12-13 14:30:42.959054016 +0000 UTC m=+21.152841559" Dec 13 14:30:42.966000 audit[2467]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2467 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:42.966000 audit[2467]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff651643c0 a2=0 a3=7fff651643ac items=0 ppid=2085 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.966000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:42.981000 audit[2467]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2467 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:30:42.981000 audit[2467]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff651643c0 a2=0 a3=7fff651643ac items=0 ppid=2085 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:42.981000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:30:43.027144 kubelet[1936]: E1213 14:30:43.027120 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.027144 kubelet[1936]: W1213 14:30:43.027138 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.027144 kubelet[1936]: E1213 14:30:43.027157 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.027404 kubelet[1936]: E1213 14:30:43.027382 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.027404 kubelet[1936]: W1213 14:30:43.027395 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.027404 kubelet[1936]: E1213 14:30:43.027402 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.027566 kubelet[1936]: E1213 14:30:43.027554 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.027566 kubelet[1936]: W1213 14:30:43.027563 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.027614 kubelet[1936]: E1213 14:30:43.027570 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.027718 kubelet[1936]: E1213 14:30:43.027706 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.027718 kubelet[1936]: W1213 14:30:43.027716 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.027770 kubelet[1936]: E1213 14:30:43.027723 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.027914 kubelet[1936]: E1213 14:30:43.027901 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.027914 kubelet[1936]: W1213 14:30:43.027912 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.027969 kubelet[1936]: E1213 14:30:43.027920 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.028064 kubelet[1936]: E1213 14:30:43.028052 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.028064 kubelet[1936]: W1213 14:30:43.028061 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.028113 kubelet[1936]: E1213 14:30:43.028068 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.028208 kubelet[1936]: E1213 14:30:43.028196 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.028208 kubelet[1936]: W1213 14:30:43.028205 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.028267 kubelet[1936]: E1213 14:30:43.028212 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.028363 kubelet[1936]: E1213 14:30:43.028350 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.028363 kubelet[1936]: W1213 14:30:43.028360 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.028416 kubelet[1936]: E1213 14:30:43.028367 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.028537 kubelet[1936]: E1213 14:30:43.028524 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.028537 kubelet[1936]: W1213 14:30:43.028534 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.028582 kubelet[1936]: E1213 14:30:43.028541 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.028685 kubelet[1936]: E1213 14:30:43.028673 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.028685 kubelet[1936]: W1213 14:30:43.028683 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.028735 kubelet[1936]: E1213 14:30:43.028690 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.028834 kubelet[1936]: E1213 14:30:43.028823 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.028834 kubelet[1936]: W1213 14:30:43.028832 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.028901 kubelet[1936]: E1213 14:30:43.028853 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.029005 kubelet[1936]: E1213 14:30:43.028994 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.029005 kubelet[1936]: W1213 14:30:43.029003 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.029056 kubelet[1936]: E1213 14:30:43.029010 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.029177 kubelet[1936]: E1213 14:30:43.029164 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.029177 kubelet[1936]: W1213 14:30:43.029174 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.029233 kubelet[1936]: E1213 14:30:43.029181 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.029345 kubelet[1936]: E1213 14:30:43.029330 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.029345 kubelet[1936]: W1213 14:30:43.029339 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.029345 kubelet[1936]: E1213 14:30:43.029346 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.029493 kubelet[1936]: E1213 14:30:43.029480 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.029493 kubelet[1936]: W1213 14:30:43.029489 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.029541 kubelet[1936]: E1213 14:30:43.029496 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.029718 kubelet[1936]: E1213 14:30:43.029706 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.029718 kubelet[1936]: W1213 14:30:43.029716 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.029765 kubelet[1936]: E1213 14:30:43.029723 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.029910 kubelet[1936]: E1213 14:30:43.029898 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.029910 kubelet[1936]: W1213 14:30:43.029908 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.029959 kubelet[1936]: E1213 14:30:43.029920 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.030084 kubelet[1936]: E1213 14:30:43.030071 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.030084 kubelet[1936]: W1213 14:30:43.030081 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.030136 kubelet[1936]: E1213 14:30:43.030092 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.030264 kubelet[1936]: E1213 14:30:43.030251 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.030264 kubelet[1936]: W1213 14:30:43.030261 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.030310 kubelet[1936]: E1213 14:30:43.030274 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.030484 kubelet[1936]: E1213 14:30:43.030461 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.030534 kubelet[1936]: W1213 14:30:43.030484 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.030534 kubelet[1936]: E1213 14:30:43.030516 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.030764 kubelet[1936]: E1213 14:30:43.030746 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.030764 kubelet[1936]: W1213 14:30:43.030755 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.030812 kubelet[1936]: E1213 14:30:43.030767 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.030948 kubelet[1936]: E1213 14:30:43.030931 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.030948 kubelet[1936]: W1213 14:30:43.030946 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.031006 kubelet[1936]: E1213 14:30:43.030965 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.031124 kubelet[1936]: E1213 14:30:43.031108 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.031124 kubelet[1936]: W1213 14:30:43.031118 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.031199 kubelet[1936]: E1213 14:30:43.031129 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.031306 kubelet[1936]: E1213 14:30:43.031291 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.031336 kubelet[1936]: W1213 14:30:43.031305 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.031336 kubelet[1936]: E1213 14:30:43.031319 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.031494 kubelet[1936]: E1213 14:30:43.031485 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.031524 kubelet[1936]: W1213 14:30:43.031494 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.031524 kubelet[1936]: E1213 14:30:43.031510 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.031659 kubelet[1936]: E1213 14:30:43.031651 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.031693 kubelet[1936]: W1213 14:30:43.031659 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.031693 kubelet[1936]: E1213 14:30:43.031671 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.031870 kubelet[1936]: E1213 14:30:43.031854 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.031870 kubelet[1936]: W1213 14:30:43.031866 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.031952 kubelet[1936]: E1213 14:30:43.031879 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.032108 kubelet[1936]: E1213 14:30:43.032096 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.032108 kubelet[1936]: W1213 14:30:43.032106 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.032159 kubelet[1936]: E1213 14:30:43.032118 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.032307 kubelet[1936]: E1213 14:30:43.032298 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.032307 kubelet[1936]: W1213 14:30:43.032306 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.032357 kubelet[1936]: E1213 14:30:43.032318 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.032625 kubelet[1936]: E1213 14:30:43.032594 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.032625 kubelet[1936]: W1213 14:30:43.032618 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.032678 kubelet[1936]: E1213 14:30:43.032643 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.032902 kubelet[1936]: E1213 14:30:43.032886 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.032902 kubelet[1936]: W1213 14:30:43.032898 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.032966 kubelet[1936]: E1213 14:30:43.032911 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.033094 kubelet[1936]: E1213 14:30:43.033072 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.033094 kubelet[1936]: W1213 14:30:43.033085 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.033144 kubelet[1936]: E1213 14:30:43.033100 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.033276 kubelet[1936]: E1213 14:30:43.033256 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:43.033276 kubelet[1936]: W1213 14:30:43.033267 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:43.033276 kubelet[1936]: E1213 14:30:43.033274 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:43.941068 kubelet[1936]: E1213 14:30:43.941034 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:44.036354 kubelet[1936]: E1213 14:30:44.036322 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.036354 kubelet[1936]: W1213 14:30:44.036341 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.036354 kubelet[1936]: E1213 14:30:44.036359 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.036626 kubelet[1936]: E1213 14:30:44.036608 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.036626 kubelet[1936]: W1213 14:30:44.036621 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.036626 kubelet[1936]: E1213 14:30:44.036630 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.036931 kubelet[1936]: E1213 14:30:44.036915 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.036931 kubelet[1936]: W1213 14:30:44.036926 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.037000 kubelet[1936]: E1213 14:30:44.036935 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.037097 kubelet[1936]: E1213 14:30:44.037081 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.037097 kubelet[1936]: W1213 14:30:44.037091 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.037097 kubelet[1936]: E1213 14:30:44.037098 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.037276 kubelet[1936]: E1213 14:30:44.037261 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.037276 kubelet[1936]: W1213 14:30:44.037270 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.037325 kubelet[1936]: E1213 14:30:44.037279 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.037458 kubelet[1936]: E1213 14:30:44.037444 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.037458 kubelet[1936]: W1213 14:30:44.037461 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.037458 kubelet[1936]: E1213 14:30:44.037468 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.037634 kubelet[1936]: E1213 14:30:44.037621 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.037634 kubelet[1936]: W1213 14:30:44.037630 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.037684 kubelet[1936]: E1213 14:30:44.037637 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.037814 kubelet[1936]: E1213 14:30:44.037792 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.037814 kubelet[1936]: W1213 14:30:44.037803 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.037890 kubelet[1936]: E1213 14:30:44.037822 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.037995 kubelet[1936]: E1213 14:30:44.037983 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.037995 kubelet[1936]: W1213 14:30:44.037993 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.038043 kubelet[1936]: E1213 14:30:44.038009 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.038194 kubelet[1936]: E1213 14:30:44.038180 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.038194 kubelet[1936]: W1213 14:30:44.038189 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.038194 kubelet[1936]: E1213 14:30:44.038197 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.038410 kubelet[1936]: E1213 14:30:44.038383 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.038410 kubelet[1936]: W1213 14:30:44.038393 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.038410 kubelet[1936]: E1213 14:30:44.038401 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.038589 kubelet[1936]: E1213 14:30:44.038574 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.038589 kubelet[1936]: W1213 14:30:44.038585 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.038589 kubelet[1936]: E1213 14:30:44.038593 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.038754 kubelet[1936]: E1213 14:30:44.038739 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.038754 kubelet[1936]: W1213 14:30:44.038749 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.038803 kubelet[1936]: E1213 14:30:44.038755 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.038927 kubelet[1936]: E1213 14:30:44.038915 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.038965 kubelet[1936]: W1213 14:30:44.038934 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.038965 kubelet[1936]: E1213 14:30:44.038942 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.039105 kubelet[1936]: E1213 14:30:44.039085 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.039105 kubelet[1936]: W1213 14:30:44.039103 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.039153 kubelet[1936]: E1213 14:30:44.039110 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.137331 kubelet[1936]: E1213 14:30:44.137281 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.137331 kubelet[1936]: W1213 14:30:44.137302 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.137331 kubelet[1936]: E1213 14:30:44.137321 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.137551 kubelet[1936]: E1213 14:30:44.137541 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.137551 kubelet[1936]: W1213 14:30:44.137549 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.137601 kubelet[1936]: E1213 14:30:44.137564 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.137955 kubelet[1936]: E1213 14:30:44.137925 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.138083 kubelet[1936]: W1213 14:30:44.137957 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.138083 kubelet[1936]: E1213 14:30:44.137993 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.138225 kubelet[1936]: E1213 14:30:44.138203 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.138225 kubelet[1936]: W1213 14:30:44.138223 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.138280 kubelet[1936]: E1213 14:30:44.138237 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.138403 kubelet[1936]: E1213 14:30:44.138391 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.138403 kubelet[1936]: W1213 14:30:44.138400 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.138454 kubelet[1936]: E1213 14:30:44.138413 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.138667 kubelet[1936]: E1213 14:30:44.138651 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.138667 kubelet[1936]: W1213 14:30:44.138660 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.138743 kubelet[1936]: E1213 14:30:44.138675 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.138983 kubelet[1936]: E1213 14:30:44.138953 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.138983 kubelet[1936]: W1213 14:30:44.138979 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.139063 kubelet[1936]: E1213 14:30:44.139009 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.139259 kubelet[1936]: E1213 14:30:44.139230 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.139259 kubelet[1936]: W1213 14:30:44.139244 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.139259 kubelet[1936]: E1213 14:30:44.139258 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.139460 kubelet[1936]: E1213 14:30:44.139446 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.139460 kubelet[1936]: W1213 14:30:44.139456 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.139512 kubelet[1936]: E1213 14:30:44.139468 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.139618 kubelet[1936]: E1213 14:30:44.139606 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.139618 kubelet[1936]: W1213 14:30:44.139616 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.139681 kubelet[1936]: E1213 14:30:44.139628 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.139830 kubelet[1936]: E1213 14:30:44.139815 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.139830 kubelet[1936]: W1213 14:30:44.139829 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.139899 kubelet[1936]: E1213 14:30:44.139863 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.140118 kubelet[1936]: E1213 14:30:44.140101 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.140118 kubelet[1936]: W1213 14:30:44.140114 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.140187 kubelet[1936]: E1213 14:30:44.140129 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.140320 kubelet[1936]: E1213 14:30:44.140306 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.140320 kubelet[1936]: W1213 14:30:44.140316 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.140374 kubelet[1936]: E1213 14:30:44.140330 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.140491 kubelet[1936]: E1213 14:30:44.140476 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.140491 kubelet[1936]: W1213 14:30:44.140487 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.140537 kubelet[1936]: E1213 14:30:44.140500 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.140652 kubelet[1936]: E1213 14:30:44.140640 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.140652 kubelet[1936]: W1213 14:30:44.140649 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.140702 kubelet[1936]: E1213 14:30:44.140656 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.140846 kubelet[1936]: E1213 14:30:44.140817 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.140846 kubelet[1936]: W1213 14:30:44.140829 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.140916 kubelet[1936]: E1213 14:30:44.140859 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.141066 kubelet[1936]: E1213 14:30:44.141052 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.141066 kubelet[1936]: W1213 14:30:44.141062 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.141125 kubelet[1936]: E1213 14:30:44.141070 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.141485 kubelet[1936]: E1213 14:30:44.141463 1936 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:30:44.141485 kubelet[1936]: W1213 14:30:44.141475 1936 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:30:44.141485 kubelet[1936]: E1213 14:30:44.141483 1936 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:30:44.726821 env[1202]: time="2024-12-13T14:30:44.726753801Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:44.728747 env[1202]: time="2024-12-13T14:30:44.728697720Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:44.732372 env[1202]: time="2024-12-13T14:30:44.732331669Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:44.733223 env[1202]: time="2024-12-13T14:30:44.733180801Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:44.733906 env[1202]: time="2024-12-13T14:30:44.733869701Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:30:44.736935 env[1202]: time="2024-12-13T14:30:44.736901885Z" level=info msg="CreateContainer within sandbox \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:30:44.754810 env[1202]: time="2024-12-13T14:30:44.754726556Z" level=info msg="CreateContainer within sandbox \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"466eb9807613e12b5598810038feb2361fab8c96b9a87bc9f8bae1e3a9af9768\"" Dec 13 14:30:44.755631 env[1202]: time="2024-12-13T14:30:44.755590016Z" level=info msg="StartContainer for \"466eb9807613e12b5598810038feb2361fab8c96b9a87bc9f8bae1e3a9af9768\"" Dec 13 14:30:44.782908 systemd[1]: Started cri-containerd-466eb9807613e12b5598810038feb2361fab8c96b9a87bc9f8bae1e3a9af9768.scope. Dec 13 14:30:44.794000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.794000 audit[2541]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f95dd987ff8 items=0 ppid=2387 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:44.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436366562393830373631336531326235353938383130303338666562 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit: BPF prog-id=133 op=LOAD Dec 13 14:30:44.795000 audit[2541]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000309f68 items=0 ppid=2387 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:44.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436366562393830373631336531326235353938383130303338666562 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit: BPF prog-id=134 op=LOAD Dec 13 14:30:44.795000 audit[2541]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000309fb8 items=0 ppid=2387 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:44.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436366562393830373631336531326235353938383130303338666562 Dec 13 14:30:44.795000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:30:44.795000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { perfmon } for pid=2541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit[2541]: AVC avc: denied { bpf } for pid=2541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:44.795000 audit: BPF prog-id=135 op=LOAD Dec 13 14:30:44.795000 audit[2541]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00035e048 items=0 ppid=2387 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:44.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436366562393830373631336531326235353938383130303338666562 Dec 13 14:30:44.807176 env[1202]: time="2024-12-13T14:30:44.807122067Z" level=info msg="StartContainer for \"466eb9807613e12b5598810038feb2361fab8c96b9a87bc9f8bae1e3a9af9768\" returns successfully" Dec 13 14:30:44.816112 systemd[1]: cri-containerd-466eb9807613e12b5598810038feb2361fab8c96b9a87bc9f8bae1e3a9af9768.scope: Deactivated successfully. Dec 13 14:30:44.822000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:30:44.891435 kubelet[1936]: E1213 14:30:44.891369 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2zzf8" podUID="70b747ec-d344-4421-ac6c-6b613f04fea5" Dec 13 14:30:45.114256 kubelet[1936]: E1213 14:30:45.114058 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:45.114256 kubelet[1936]: E1213 14:30:45.114141 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:45.200428 env[1202]: time="2024-12-13T14:30:45.200371221Z" level=info msg="shim disconnected" id=466eb9807613e12b5598810038feb2361fab8c96b9a87bc9f8bae1e3a9af9768 Dec 13 14:30:45.200428 env[1202]: time="2024-12-13T14:30:45.200423390Z" level=warning msg="cleaning up after shim disconnected" id=466eb9807613e12b5598810038feb2361fab8c96b9a87bc9f8bae1e3a9af9768 namespace=k8s.io Dec 13 14:30:45.200428 env[1202]: time="2024-12-13T14:30:45.200435643Z" level=info msg="cleaning up dead shim" Dec 13 14:30:45.206658 env[1202]: time="2024-12-13T14:30:45.206624629Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:30:45Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2584 runtime=io.containerd.runc.v2\n" Dec 13 14:30:45.749520 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-466eb9807613e12b5598810038feb2361fab8c96b9a87bc9f8bae1e3a9af9768-rootfs.mount: Deactivated successfully. Dec 13 14:30:46.117247 kubelet[1936]: E1213 14:30:46.117214 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:46.118065 env[1202]: time="2024-12-13T14:30:46.118029064Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:30:46.890851 kubelet[1936]: E1213 14:30:46.890762 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2zzf8" podUID="70b747ec-d344-4421-ac6c-6b613f04fea5" Dec 13 14:30:48.891246 kubelet[1936]: E1213 14:30:48.891136 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2zzf8" podUID="70b747ec-d344-4421-ac6c-6b613f04fea5" Dec 13 14:30:50.891114 kubelet[1936]: E1213 14:30:50.891066 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2zzf8" podUID="70b747ec-d344-4421-ac6c-6b613f04fea5" Dec 13 14:30:52.293043 env[1202]: time="2024-12-13T14:30:52.292995012Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:52.304277 env[1202]: time="2024-12-13T14:30:52.304247816Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:52.306670 env[1202]: time="2024-12-13T14:30:52.306631363Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:52.308276 env[1202]: time="2024-12-13T14:30:52.308246232Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:30:52.308788 env[1202]: time="2024-12-13T14:30:52.308759539Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:30:52.311032 env[1202]: time="2024-12-13T14:30:52.310970491Z" level=info msg="CreateContainer within sandbox \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:30:52.326121 env[1202]: time="2024-12-13T14:30:52.326054288Z" level=info msg="CreateContainer within sandbox \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"cda2ba2f48caa20071e4f132d9345a0649525abd474499af970cf4cf1f50a79a\"" Dec 13 14:30:52.326821 env[1202]: time="2024-12-13T14:30:52.326761779Z" level=info msg="StartContainer for \"cda2ba2f48caa20071e4f132d9345a0649525abd474499af970cf4cf1f50a79a\"" Dec 13 14:30:52.346876 systemd[1]: Started cri-containerd-cda2ba2f48caa20071e4f132d9345a0649525abd474499af970cf4cf1f50a79a.scope. Dec 13 14:30:52.374443 kernel: kauditd_printk_skb: 97 callbacks suppressed Dec 13 14:30:52.374661 kernel: audit: type=1400 audit(1734100252.363:991): avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.374695 kernel: audit: type=1300 audit(1734100252.363:991): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3cc2ad0688 items=0 ppid=2387 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:52.363000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.363000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3cc2ad0688 items=0 ppid=2387 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:52.375966 kernel: audit: type=1327 audit(1734100252.363:991): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364613262613266343863616132303037316534663133326439333435 Dec 13 14:30:52.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364613262613266343863616132303037316534663133326439333435 Dec 13 14:30:52.363000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.383356 kernel: audit: type=1400 audit(1734100252.363:992): avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.387619 kernel: audit: type=1400 audit(1734100252.363:992): avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.363000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.363000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.396642 kernel: audit: type=1400 audit(1734100252.363:992): avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.396721 kernel: audit: type=1400 audit(1734100252.363:992): avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.363000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.363000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.400906 kernel: audit: type=1400 audit(1734100252.363:992): avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.401034 kernel: audit: type=1400 audit(1734100252.363:992): avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.363000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.363000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.407586 kernel: audit: type=1400 audit(1734100252.363:992): avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.363000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.363000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.363000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.363000 audit: BPF prog-id=136 op=LOAD Dec 13 14:30:52.363000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00029bf08 items=0 ppid=2387 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:52.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364613262613266343863616132303037316534663133326439333435 Dec 13 14:30:52.368000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.368000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.368000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.368000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.368000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.368000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.368000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.368000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.368000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.368000 audit: BPF prog-id=137 op=LOAD Dec 13 14:30:52.368000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00029bf58 items=0 ppid=2387 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:52.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364613262613266343863616132303037316534663133326439333435 Dec 13 14:30:52.374000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:30:52.374000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:30:52.374000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.374000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.374000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.374000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.374000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.374000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.374000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.374000 audit[2605]: AVC avc: denied { perfmon } for pid=2605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.374000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.374000 audit[2605]: AVC avc: denied { bpf } for pid=2605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:30:52.374000 audit: BPF prog-id=138 op=LOAD Dec 13 14:30:52.374000 audit[2605]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00029bfe8 items=0 ppid=2387 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:52.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364613262613266343863616132303037316534663133326439333435 Dec 13 14:30:52.892438 kubelet[1936]: E1213 14:30:52.892398 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2zzf8" podUID="70b747ec-d344-4421-ac6c-6b613f04fea5" Dec 13 14:30:52.967688 env[1202]: time="2024-12-13T14:30:52.967627033Z" level=info msg="StartContainer for \"cda2ba2f48caa20071e4f132d9345a0649525abd474499af970cf4cf1f50a79a\" returns successfully" Dec 13 14:30:53.130689 kubelet[1936]: E1213 14:30:53.130632 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:53.321696 systemd[1]: run-containerd-runc-k8s.io-cda2ba2f48caa20071e4f132d9345a0649525abd474499af970cf4cf1f50a79a-runc.bQUc1x.mount: Deactivated successfully. Dec 13 14:30:54.153350 kubelet[1936]: E1213 14:30:54.153309 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:54.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.133:22-10.0.0.1:50658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:54.298648 systemd[1]: Started sshd@7-10.0.0.133:22-10.0.0.1:50658.service. Dec 13 14:30:54.320575 systemd[1]: cri-containerd-cda2ba2f48caa20071e4f132d9345a0649525abd474499af970cf4cf1f50a79a.scope: Deactivated successfully. Dec 13 14:30:54.324000 audit: BPF prog-id=138 op=UNLOAD Dec 13 14:30:54.338521 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cda2ba2f48caa20071e4f132d9345a0649525abd474499af970cf4cf1f50a79a-rootfs.mount: Deactivated successfully. Dec 13 14:30:54.339000 audit[2635]: USER_ACCT pid=2635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:54.340851 sshd[2635]: Accepted publickey for core from 10.0.0.1 port 50658 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:30:54.340000 audit[2635]: CRED_ACQ pid=2635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:54.340000 audit[2635]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc78509190 a2=3 a3=0 items=0 ppid=1 pid=2635 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:54.340000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:30:54.342153 sshd[2635]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:30:54.344377 env[1202]: time="2024-12-13T14:30:54.344323078Z" level=info msg="shim disconnected" id=cda2ba2f48caa20071e4f132d9345a0649525abd474499af970cf4cf1f50a79a Dec 13 14:30:54.344377 env[1202]: time="2024-12-13T14:30:54.344371890Z" level=warning msg="cleaning up after shim disconnected" id=cda2ba2f48caa20071e4f132d9345a0649525abd474499af970cf4cf1f50a79a namespace=k8s.io Dec 13 14:30:54.344691 env[1202]: time="2024-12-13T14:30:54.344381197Z" level=info msg="cleaning up dead shim" Dec 13 14:30:54.346635 systemd[1]: Started session-8.scope. Dec 13 14:30:54.348096 systemd-logind[1194]: New session 8 of user core. Dec 13 14:30:54.352389 env[1202]: time="2024-12-13T14:30:54.352272236Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:30:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2650 runtime=io.containerd.runc.v2\n" Dec 13 14:30:54.352000 audit[2635]: USER_START pid=2635 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:54.353000 audit[2662]: CRED_ACQ pid=2662 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:54.357572 kubelet[1936]: I1213 14:30:54.357542 1936 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 14:30:54.384416 systemd[1]: Created slice kubepods-burstable-podf0a57d84_e132_4284_94a6_b96e0303f6d5.slice. Dec 13 14:30:54.391477 systemd[1]: Created slice kubepods-besteffort-podf39245bb_41cd_43ab_822c_851b5676f474.slice. Dec 13 14:30:54.397128 systemd[1]: Created slice kubepods-besteffort-podecb2651e_9af3_4fc2_95b6_4b69df48c1c1.slice. Dec 13 14:30:54.403377 systemd[1]: Created slice kubepods-burstable-podaa1c80dd_0a17_4c41_926a_b2ddc897d0c9.slice. Dec 13 14:30:54.408506 systemd[1]: Created slice kubepods-besteffort-pod0076d11e_8179_4a1b_b0bb_1e2f984b0e09.slice. Dec 13 14:30:54.491795 sshd[2635]: pam_unix(sshd:session): session closed for user core Dec 13 14:30:54.491000 audit[2635]: USER_END pid=2635 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:54.491000 audit[2635]: CRED_DISP pid=2635 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:54.494116 systemd[1]: sshd@7-10.0.0.133:22-10.0.0.1:50658.service: Deactivated successfully. Dec 13 14:30:54.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.133:22-10.0.0.1:50658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:54.494806 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:30:54.495393 systemd-logind[1194]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:30:54.496166 systemd-logind[1194]: Removed session 8. Dec 13 14:30:54.553209 kubelet[1936]: I1213 14:30:54.553173 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f39245bb-41cd-43ab-822c-851b5676f474-calico-apiserver-certs\") pod \"calico-apiserver-65c546cf68-4mhg9\" (UID: \"f39245bb-41cd-43ab-822c-851b5676f474\") " pod="calico-apiserver/calico-apiserver-65c546cf68-4mhg9" Dec 13 14:30:54.553318 kubelet[1936]: I1213 14:30:54.553214 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0076d11e-8179-4a1b-b0bb-1e2f984b0e09-tigera-ca-bundle\") pod \"calico-kube-controllers-856cb6d94c-5hc9r\" (UID: \"0076d11e-8179-4a1b-b0bb-1e2f984b0e09\") " pod="calico-system/calico-kube-controllers-856cb6d94c-5hc9r" Dec 13 14:30:54.553318 kubelet[1936]: I1213 14:30:54.553230 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f0a57d84-e132-4284-94a6-b96e0303f6d5-config-volume\") pod \"coredns-6f6b679f8f-wrcpk\" (UID: \"f0a57d84-e132-4284-94a6-b96e0303f6d5\") " pod="kube-system/coredns-6f6b679f8f-wrcpk" Dec 13 14:30:54.553318 kubelet[1936]: I1213 14:30:54.553246 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2wtr7\" (UniqueName: \"kubernetes.io/projected/aa1c80dd-0a17-4c41-926a-b2ddc897d0c9-kube-api-access-2wtr7\") pod \"coredns-6f6b679f8f-h5wrj\" (UID: \"aa1c80dd-0a17-4c41-926a-b2ddc897d0c9\") " pod="kube-system/coredns-6f6b679f8f-h5wrj" Dec 13 14:30:54.553318 kubelet[1936]: I1213 14:30:54.553263 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/aa1c80dd-0a17-4c41-926a-b2ddc897d0c9-config-volume\") pod \"coredns-6f6b679f8f-h5wrj\" (UID: \"aa1c80dd-0a17-4c41-926a-b2ddc897d0c9\") " pod="kube-system/coredns-6f6b679f8f-h5wrj" Dec 13 14:30:54.553318 kubelet[1936]: I1213 14:30:54.553278 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ecb2651e-9af3-4fc2-95b6-4b69df48c1c1-calico-apiserver-certs\") pod \"calico-apiserver-65c546cf68-5bqp7\" (UID: \"ecb2651e-9af3-4fc2-95b6-4b69df48c1c1\") " pod="calico-apiserver/calico-apiserver-65c546cf68-5bqp7" Dec 13 14:30:54.553445 kubelet[1936]: I1213 14:30:54.553298 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fhpxr\" (UniqueName: \"kubernetes.io/projected/f39245bb-41cd-43ab-822c-851b5676f474-kube-api-access-fhpxr\") pod \"calico-apiserver-65c546cf68-4mhg9\" (UID: \"f39245bb-41cd-43ab-822c-851b5676f474\") " pod="calico-apiserver/calico-apiserver-65c546cf68-4mhg9" Dec 13 14:30:54.553445 kubelet[1936]: I1213 14:30:54.553313 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bxhx5\" (UniqueName: \"kubernetes.io/projected/f0a57d84-e132-4284-94a6-b96e0303f6d5-kube-api-access-bxhx5\") pod \"coredns-6f6b679f8f-wrcpk\" (UID: \"f0a57d84-e132-4284-94a6-b96e0303f6d5\") " pod="kube-system/coredns-6f6b679f8f-wrcpk" Dec 13 14:30:54.553445 kubelet[1936]: I1213 14:30:54.553329 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cttg5\" (UniqueName: \"kubernetes.io/projected/0076d11e-8179-4a1b-b0bb-1e2f984b0e09-kube-api-access-cttg5\") pod \"calico-kube-controllers-856cb6d94c-5hc9r\" (UID: \"0076d11e-8179-4a1b-b0bb-1e2f984b0e09\") " pod="calico-system/calico-kube-controllers-856cb6d94c-5hc9r" Dec 13 14:30:54.553445 kubelet[1936]: I1213 14:30:54.553364 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sjqcx\" (UniqueName: \"kubernetes.io/projected/ecb2651e-9af3-4fc2-95b6-4b69df48c1c1-kube-api-access-sjqcx\") pod \"calico-apiserver-65c546cf68-5bqp7\" (UID: \"ecb2651e-9af3-4fc2-95b6-4b69df48c1c1\") " pod="calico-apiserver/calico-apiserver-65c546cf68-5bqp7" Dec 13 14:30:54.687599 kubelet[1936]: E1213 14:30:54.687509 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:54.688292 env[1202]: time="2024-12-13T14:30:54.688253161Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-wrcpk,Uid:f0a57d84-e132-4284-94a6-b96e0303f6d5,Namespace:kube-system,Attempt:0,}" Dec 13 14:30:54.695541 env[1202]: time="2024-12-13T14:30:54.695507712Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65c546cf68-4mhg9,Uid:f39245bb-41cd-43ab-822c-851b5676f474,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:30:54.701180 env[1202]: time="2024-12-13T14:30:54.701127186Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65c546cf68-5bqp7,Uid:ecb2651e-9af3-4fc2-95b6-4b69df48c1c1,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:30:54.707383 kubelet[1936]: E1213 14:30:54.707351 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:54.708554 env[1202]: time="2024-12-13T14:30:54.708512432Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-h5wrj,Uid:aa1c80dd-0a17-4c41-926a-b2ddc897d0c9,Namespace:kube-system,Attempt:0,}" Dec 13 14:30:54.711293 env[1202]: time="2024-12-13T14:30:54.711251427Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-856cb6d94c-5hc9r,Uid:0076d11e-8179-4a1b-b0bb-1e2f984b0e09,Namespace:calico-system,Attempt:0,}" Dec 13 14:30:54.820504 env[1202]: time="2024-12-13T14:30:54.820428291Z" level=error msg="Failed to destroy network for sandbox \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.821088 env[1202]: time="2024-12-13T14:30:54.821050161Z" level=error msg="encountered an error cleaning up failed sandbox \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.821222 env[1202]: time="2024-12-13T14:30:54.821195024Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-wrcpk,Uid:f0a57d84-e132-4284-94a6-b96e0303f6d5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.821574 kubelet[1936]: E1213 14:30:54.821535 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.821670 kubelet[1936]: E1213 14:30:54.821616 1936 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-wrcpk" Dec 13 14:30:54.821670 kubelet[1936]: E1213 14:30:54.821637 1936 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-wrcpk" Dec 13 14:30:54.821725 kubelet[1936]: E1213 14:30:54.821678 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-wrcpk_kube-system(f0a57d84-e132-4284-94a6-b96e0303f6d5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-wrcpk_kube-system(f0a57d84-e132-4284-94a6-b96e0303f6d5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-wrcpk" podUID="f0a57d84-e132-4284-94a6-b96e0303f6d5" Dec 13 14:30:54.827669 env[1202]: time="2024-12-13T14:30:54.827602861Z" level=error msg="Failed to destroy network for sandbox \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.828015 env[1202]: time="2024-12-13T14:30:54.827985872Z" level=error msg="encountered an error cleaning up failed sandbox \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.828112 env[1202]: time="2024-12-13T14:30:54.828071903Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65c546cf68-4mhg9,Uid:f39245bb-41cd-43ab-822c-851b5676f474,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.828509 kubelet[1936]: E1213 14:30:54.828430 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.828590 kubelet[1936]: E1213 14:30:54.828569 1936 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65c546cf68-4mhg9" Dec 13 14:30:54.828621 kubelet[1936]: E1213 14:30:54.828599 1936 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65c546cf68-4mhg9" Dec 13 14:30:54.828684 kubelet[1936]: E1213 14:30:54.828656 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-65c546cf68-4mhg9_calico-apiserver(f39245bb-41cd-43ab-822c-851b5676f474)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-65c546cf68-4mhg9_calico-apiserver(f39245bb-41cd-43ab-822c-851b5676f474)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65c546cf68-4mhg9" podUID="f39245bb-41cd-43ab-822c-851b5676f474" Dec 13 14:30:54.835596 env[1202]: time="2024-12-13T14:30:54.835504820Z" level=error msg="Failed to destroy network for sandbox \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.836121 env[1202]: time="2024-12-13T14:30:54.836094069Z" level=error msg="encountered an error cleaning up failed sandbox \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.836242 env[1202]: time="2024-12-13T14:30:54.836214225Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-h5wrj,Uid:aa1c80dd-0a17-4c41-926a-b2ddc897d0c9,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.836776 kubelet[1936]: E1213 14:30:54.836461 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.836776 kubelet[1936]: E1213 14:30:54.836515 1936 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-h5wrj" Dec 13 14:30:54.836776 kubelet[1936]: E1213 14:30:54.836535 1936 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-h5wrj" Dec 13 14:30:54.837154 kubelet[1936]: E1213 14:30:54.836576 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-h5wrj_kube-system(aa1c80dd-0a17-4c41-926a-b2ddc897d0c9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-h5wrj_kube-system(aa1c80dd-0a17-4c41-926a-b2ddc897d0c9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-h5wrj" podUID="aa1c80dd-0a17-4c41-926a-b2ddc897d0c9" Dec 13 14:30:54.845993 env[1202]: time="2024-12-13T14:30:54.845931048Z" level=error msg="Failed to destroy network for sandbox \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.846417 env[1202]: time="2024-12-13T14:30:54.846367991Z" level=error msg="encountered an error cleaning up failed sandbox \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.846609 env[1202]: time="2024-12-13T14:30:54.846472147Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65c546cf68-5bqp7,Uid:ecb2651e-9af3-4fc2-95b6-4b69df48c1c1,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.846790 kubelet[1936]: E1213 14:30:54.846742 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.846895 kubelet[1936]: E1213 14:30:54.846823 1936 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65c546cf68-5bqp7" Dec 13 14:30:54.846895 kubelet[1936]: E1213 14:30:54.846864 1936 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65c546cf68-5bqp7" Dec 13 14:30:54.846953 kubelet[1936]: E1213 14:30:54.846931 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-65c546cf68-5bqp7_calico-apiserver(ecb2651e-9af3-4fc2-95b6-4b69df48c1c1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-65c546cf68-5bqp7_calico-apiserver(ecb2651e-9af3-4fc2-95b6-4b69df48c1c1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65c546cf68-5bqp7" podUID="ecb2651e-9af3-4fc2-95b6-4b69df48c1c1" Dec 13 14:30:54.868079 env[1202]: time="2024-12-13T14:30:54.867997791Z" level=error msg="Failed to destroy network for sandbox \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.868351 env[1202]: time="2024-12-13T14:30:54.868323724Z" level=error msg="encountered an error cleaning up failed sandbox \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.868388 env[1202]: time="2024-12-13T14:30:54.868367166Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-856cb6d94c-5hc9r,Uid:0076d11e-8179-4a1b-b0bb-1e2f984b0e09,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.868660 kubelet[1936]: E1213 14:30:54.868614 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.868754 kubelet[1936]: E1213 14:30:54.868680 1936 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-856cb6d94c-5hc9r" Dec 13 14:30:54.868754 kubelet[1936]: E1213 14:30:54.868701 1936 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-856cb6d94c-5hc9r" Dec 13 14:30:54.868855 kubelet[1936]: E1213 14:30:54.868759 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-856cb6d94c-5hc9r_calico-system(0076d11e-8179-4a1b-b0bb-1e2f984b0e09)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-856cb6d94c-5hc9r_calico-system(0076d11e-8179-4a1b-b0bb-1e2f984b0e09)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-856cb6d94c-5hc9r" podUID="0076d11e-8179-4a1b-b0bb-1e2f984b0e09" Dec 13 14:30:54.897578 systemd[1]: Created slice kubepods-besteffort-pod70b747ec_d344_4421_ac6c_6b613f04fea5.slice. Dec 13 14:30:54.899622 env[1202]: time="2024-12-13T14:30:54.899570069Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2zzf8,Uid:70b747ec-d344-4421-ac6c-6b613f04fea5,Namespace:calico-system,Attempt:0,}" Dec 13 14:30:54.974010 env[1202]: time="2024-12-13T14:30:54.973862072Z" level=error msg="Failed to destroy network for sandbox \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.974272 env[1202]: time="2024-12-13T14:30:54.974244592Z" level=error msg="encountered an error cleaning up failed sandbox \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.974324 env[1202]: time="2024-12-13T14:30:54.974299425Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2zzf8,Uid:70b747ec-d344-4421-ac6c-6b613f04fea5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.974593 kubelet[1936]: E1213 14:30:54.974540 1936 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:54.974698 kubelet[1936]: E1213 14:30:54.974600 1936 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2zzf8" Dec 13 14:30:54.974698 kubelet[1936]: E1213 14:30:54.974618 1936 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2zzf8" Dec 13 14:30:54.974698 kubelet[1936]: E1213 14:30:54.974663 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-2zzf8_calico-system(70b747ec-d344-4421-ac6c-6b613f04fea5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-2zzf8_calico-system(70b747ec-d344-4421-ac6c-6b613f04fea5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2zzf8" podUID="70b747ec-d344-4421-ac6c-6b613f04fea5" Dec 13 14:30:55.156655 kubelet[1936]: E1213 14:30:55.156619 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:30:55.158314 kubelet[1936]: I1213 14:30:55.158282 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Dec 13 14:30:55.159014 env[1202]: time="2024-12-13T14:30:55.158920088Z" level=info msg="StopPodSandbox for \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\"" Dec 13 14:30:55.159580 kubelet[1936]: I1213 14:30:55.159557 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Dec 13 14:30:55.159980 env[1202]: time="2024-12-13T14:30:55.159941710Z" level=info msg="StopPodSandbox for \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\"" Dec 13 14:30:55.160642 env[1202]: time="2024-12-13T14:30:55.160618804Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:30:55.161832 kubelet[1936]: I1213 14:30:55.161492 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Dec 13 14:30:55.162107 env[1202]: time="2024-12-13T14:30:55.162084000Z" level=info msg="StopPodSandbox for \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\"" Dec 13 14:30:55.165331 kubelet[1936]: I1213 14:30:55.164940 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Dec 13 14:30:55.165635 env[1202]: time="2024-12-13T14:30:55.165600466Z" level=info msg="StopPodSandbox for \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\"" Dec 13 14:30:55.168461 kubelet[1936]: I1213 14:30:55.167943 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Dec 13 14:30:55.168798 env[1202]: time="2024-12-13T14:30:55.168749139Z" level=info msg="StopPodSandbox for \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\"" Dec 13 14:30:55.173423 kubelet[1936]: I1213 14:30:55.173076 1936 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Dec 13 14:30:55.174099 env[1202]: time="2024-12-13T14:30:55.174001671Z" level=info msg="StopPodSandbox for \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\"" Dec 13 14:30:55.210211 env[1202]: time="2024-12-13T14:30:55.210149284Z" level=error msg="StopPodSandbox for \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\" failed" error="failed to destroy network for sandbox \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:55.210752 kubelet[1936]: E1213 14:30:55.210572 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Dec 13 14:30:55.210752 kubelet[1936]: E1213 14:30:55.210630 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3"} Dec 13 14:30:55.210752 kubelet[1936]: E1213 14:30:55.210701 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f39245bb-41cd-43ab-822c-851b5676f474\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:30:55.210752 kubelet[1936]: E1213 14:30:55.210723 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f39245bb-41cd-43ab-822c-851b5676f474\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65c546cf68-4mhg9" podUID="f39245bb-41cd-43ab-822c-851b5676f474" Dec 13 14:30:55.211790 env[1202]: time="2024-12-13T14:30:55.211720831Z" level=error msg="StopPodSandbox for \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\" failed" error="failed to destroy network for sandbox \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:55.212310 kubelet[1936]: E1213 14:30:55.212242 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Dec 13 14:30:55.212310 kubelet[1936]: E1213 14:30:55.212282 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943"} Dec 13 14:30:55.212310 kubelet[1936]: E1213 14:30:55.212311 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"aa1c80dd-0a17-4c41-926a-b2ddc897d0c9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:30:55.212519 kubelet[1936]: E1213 14:30:55.212333 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"aa1c80dd-0a17-4c41-926a-b2ddc897d0c9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-h5wrj" podUID="aa1c80dd-0a17-4c41-926a-b2ddc897d0c9" Dec 13 14:30:55.222582 env[1202]: time="2024-12-13T14:30:55.222526238Z" level=error msg="StopPodSandbox for \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\" failed" error="failed to destroy network for sandbox \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:55.223136 kubelet[1936]: E1213 14:30:55.222939 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Dec 13 14:30:55.223136 kubelet[1936]: E1213 14:30:55.223005 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6"} Dec 13 14:30:55.223136 kubelet[1936]: E1213 14:30:55.223052 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f0a57d84-e132-4284-94a6-b96e0303f6d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:30:55.223136 kubelet[1936]: E1213 14:30:55.223092 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f0a57d84-e132-4284-94a6-b96e0303f6d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-wrcpk" podUID="f0a57d84-e132-4284-94a6-b96e0303f6d5" Dec 13 14:30:55.223541 env[1202]: time="2024-12-13T14:30:55.223503868Z" level=error msg="StopPodSandbox for \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\" failed" error="failed to destroy network for sandbox \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:55.223925 kubelet[1936]: E1213 14:30:55.223774 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Dec 13 14:30:55.223925 kubelet[1936]: E1213 14:30:55.223806 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe"} Dec 13 14:30:55.223925 kubelet[1936]: E1213 14:30:55.223855 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0076d11e-8179-4a1b-b0bb-1e2f984b0e09\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:30:55.223925 kubelet[1936]: E1213 14:30:55.223880 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0076d11e-8179-4a1b-b0bb-1e2f984b0e09\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-856cb6d94c-5hc9r" podUID="0076d11e-8179-4a1b-b0bb-1e2f984b0e09" Dec 13 14:30:55.237885 env[1202]: time="2024-12-13T14:30:55.236520205Z" level=error msg="StopPodSandbox for \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\" failed" error="failed to destroy network for sandbox \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:55.238039 kubelet[1936]: E1213 14:30:55.236723 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Dec 13 14:30:55.238039 kubelet[1936]: E1213 14:30:55.236767 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0"} Dec 13 14:30:55.238039 kubelet[1936]: E1213 14:30:55.236805 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ecb2651e-9af3-4fc2-95b6-4b69df48c1c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:30:55.238039 kubelet[1936]: E1213 14:30:55.236831 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ecb2651e-9af3-4fc2-95b6-4b69df48c1c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65c546cf68-5bqp7" podUID="ecb2651e-9af3-4fc2-95b6-4b69df48c1c1" Dec 13 14:30:55.243599 env[1202]: time="2024-12-13T14:30:55.243514914Z" level=error msg="StopPodSandbox for \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\" failed" error="failed to destroy network for sandbox \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:30:55.243758 kubelet[1936]: E1213 14:30:55.243718 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Dec 13 14:30:55.243758 kubelet[1936]: E1213 14:30:55.243744 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7"} Dec 13 14:30:55.243934 kubelet[1936]: E1213 14:30:55.243765 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"70b747ec-d344-4421-ac6c-6b613f04fea5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:30:55.243934 kubelet[1936]: E1213 14:30:55.243781 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"70b747ec-d344-4421-ac6c-6b613f04fea5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2zzf8" podUID="70b747ec-d344-4421-ac6c-6b613f04fea5" Dec 13 14:30:59.496875 systemd[1]: Started sshd@8-10.0.0.133:22-10.0.0.1:38568.service. Dec 13 14:30:59.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.133:22-10.0.0.1:38568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.499521 kernel: kauditd_printk_skb: 45 callbacks suppressed Dec 13 14:30:59.499597 kernel: audit: type=1130 audit(1734100259.496:1007): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.133:22-10.0.0.1:38568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.541000 audit[3048]: USER_ACCT pid=3048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:59.542991 sshd[3048]: Accepted publickey for core from 10.0.0.1 port 38568 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:30:59.545802 sshd[3048]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:30:59.544000 audit[3048]: CRED_ACQ pid=3048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:59.550592 kernel: audit: type=1101 audit(1734100259.541:1008): pid=3048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:59.550664 kernel: audit: type=1103 audit(1734100259.544:1009): pid=3048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:59.550689 kernel: audit: type=1006 audit(1734100259.544:1010): pid=3048 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Dec 13 14:30:59.550570 systemd[1]: Started session-9.scope. Dec 13 14:30:59.550871 systemd-logind[1194]: New session 9 of user core. Dec 13 14:30:59.544000 audit[3048]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9ee30960 a2=3 a3=0 items=0 ppid=1 pid=3048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:59.556689 kernel: audit: type=1300 audit(1734100259.544:1010): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9ee30960 a2=3 a3=0 items=0 ppid=1 pid=3048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:59.557372 kernel: audit: type=1327 audit(1734100259.544:1010): proctitle=737368643A20636F7265205B707269765D Dec 13 14:30:59.544000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:30:59.554000 audit[3048]: USER_START pid=3048 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:59.562435 kernel: audit: type=1105 audit(1734100259.554:1011): pid=3048 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:59.562506 kernel: audit: type=1103 audit(1734100259.556:1012): pid=3050 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:59.556000 audit[3050]: CRED_ACQ pid=3050 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:59.663691 sshd[3048]: pam_unix(sshd:session): session closed for user core Dec 13 14:30:59.673174 kernel: audit: type=1106 audit(1734100259.663:1013): pid=3048 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:59.673246 kernel: audit: type=1104 audit(1734100259.663:1014): pid=3048 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:59.663000 audit[3048]: USER_END pid=3048 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:59.663000 audit[3048]: CRED_DISP pid=3048 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:30:59.666190 systemd[1]: sshd@8-10.0.0.133:22-10.0.0.1:38568.service: Deactivated successfully. Dec 13 14:30:59.667011 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:30:59.667629 systemd-logind[1194]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:30:59.668432 systemd-logind[1194]: Removed session 9. Dec 13 14:30:59.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.133:22-10.0.0.1:38568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.190820 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3256044475.mount: Deactivated successfully. Dec 13 14:31:04.539369 env[1202]: time="2024-12-13T14:31:04.539304609Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:04.668522 systemd[1]: Started sshd@9-10.0.0.133:22-10.0.0.1:38572.service. Dec 13 14:31:04.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.133:22-10.0.0.1:38572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:04.669967 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:31:04.670026 kernel: audit: type=1130 audit(1734100264.667:1016): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.133:22-10.0.0.1:38572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:04.714000 audit[3067]: USER_ACCT pid=3067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:04.715694 sshd[3067]: Accepted publickey for core from 10.0.0.1 port 38572 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:31:04.717514 sshd[3067]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:04.716000 audit[3067]: CRED_ACQ pid=3067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:04.722579 systemd-logind[1194]: New session 10 of user core. Dec 13 14:31:04.723379 systemd[1]: Started session-10.scope. Dec 13 14:31:04.730855 kernel: audit: type=1101 audit(1734100264.714:1017): pid=3067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:04.730936 kernel: audit: type=1103 audit(1734100264.716:1018): pid=3067 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:04.730966 kernel: audit: type=1006 audit(1734100264.716:1019): pid=3067 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 14:31:04.733555 kernel: audit: type=1300 audit(1734100264.716:1019): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff20ab2130 a2=3 a3=0 items=0 ppid=1 pid=3067 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:04.716000 audit[3067]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff20ab2130 a2=3 a3=0 items=0 ppid=1 pid=3067 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:04.716000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:04.739688 kernel: audit: type=1327 audit(1734100264.716:1019): proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:04.739718 kernel: audit: type=1105 audit(1734100264.726:1020): pid=3067 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:04.726000 audit[3067]: USER_START pid=3067 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:04.727000 audit[3069]: CRED_ACQ pid=3069 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:04.748616 kernel: audit: type=1103 audit(1734100264.727:1021): pid=3069 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:04.830593 sshd[3067]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:04.831000 audit[3067]: USER_END pid=3067 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:04.833789 systemd[1]: sshd@9-10.0.0.133:22-10.0.0.1:38572.service: Deactivated successfully. Dec 13 14:31:04.834721 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:31:04.835721 systemd-logind[1194]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:31:04.831000 audit[3067]: CRED_DISP pid=3067 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:04.836497 systemd-logind[1194]: Removed session 10. Dec 13 14:31:04.839919 kernel: audit: type=1106 audit(1734100264.831:1022): pid=3067 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:04.840053 kernel: audit: type=1104 audit(1734100264.831:1023): pid=3067 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:04.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.133:22-10.0.0.1:38572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.022965 env[1202]: time="2024-12-13T14:31:05.022889110Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:05.392944 env[1202]: time="2024-12-13T14:31:05.392820099Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:05.584417 env[1202]: time="2024-12-13T14:31:05.584358517Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:05.584912 env[1202]: time="2024-12-13T14:31:05.584809704Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:31:05.596748 env[1202]: time="2024-12-13T14:31:05.596688057Z" level=info msg="CreateContainer within sandbox \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:31:06.307386 env[1202]: time="2024-12-13T14:31:06.307275530Z" level=info msg="CreateContainer within sandbox \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9\"" Dec 13 14:31:06.309176 env[1202]: time="2024-12-13T14:31:06.307788084Z" level=info msg="StartContainer for \"e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9\"" Dec 13 14:31:06.325297 systemd[1]: Started cri-containerd-e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9.scope. Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f42307b6f88 items=0 ppid=2387 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:06.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537383136663463366531353664316236646261343063396466353230 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit: BPF prog-id=139 op=LOAD Dec 13 14:31:06.341000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001fc898 items=0 ppid=2387 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:06.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537383136663463366531353664316236646261343063396466353230 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit: BPF prog-id=140 op=LOAD Dec 13 14:31:06.341000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fc8e8 items=0 ppid=2387 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:06.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537383136663463366531353664316236646261343063396466353230 Dec 13 14:31:06.341000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:31:06.341000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { perfmon } for pid=3089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit[3089]: AVC avc: denied { bpf } for pid=3089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:06.341000 audit: BPF prog-id=141 op=LOAD Dec 13 14:31:06.341000 audit[3089]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fc978 items=0 ppid=2387 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:06.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537383136663463366531353664316236646261343063396466353230 Dec 13 14:31:06.411390 env[1202]: time="2024-12-13T14:31:06.411301028Z" level=info msg="StartContainer for \"e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9\" returns successfully" Dec 13 14:31:06.425482 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:31:06.425705 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:31:06.448062 systemd[1]: cri-containerd-e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9.scope: Deactivated successfully. Dec 13 14:31:06.452000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:31:06.560568 kubelet[1936]: E1213 14:31:06.560404 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:06.591402 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9-rootfs.mount: Deactivated successfully. Dec 13 14:31:06.844833 env[1202]: time="2024-12-13T14:31:06.844678918Z" level=info msg="shim disconnected" id=e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9 Dec 13 14:31:06.844833 env[1202]: time="2024-12-13T14:31:06.844725285Z" level=warning msg="cleaning up after shim disconnected" id=e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9 namespace=k8s.io Dec 13 14:31:06.844833 env[1202]: time="2024-12-13T14:31:06.844734231Z" level=info msg="cleaning up dead shim" Dec 13 14:31:06.845274 env[1202]: time="2024-12-13T14:31:06.844919330Z" level=error msg="ExecSync for \"e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to create exec \"609ff58bb3f7a52df74e55f2f131de2bdb638694dcc4cd684fb44f069a99d42b\": task e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9 not found: not found" Dec 13 14:31:06.845310 kubelet[1936]: E1213 14:31:06.845185 1936 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to create exec \"609ff58bb3f7a52df74e55f2f131de2bdb638694dcc4cd684fb44f069a99d42b\": task e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9 not found: not found" containerID="e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 14:31:06.846369 env[1202]: time="2024-12-13T14:31:06.846327735Z" level=error msg="ExecSync for \"e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9 not found: not found" Dec 13 14:31:06.846532 kubelet[1936]: E1213 14:31:06.846489 1936 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9 not found: not found" containerID="e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 14:31:06.847527 env[1202]: time="2024-12-13T14:31:06.847472955Z" level=error msg="ExecSync for \"e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9\" failed" error="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9 not found: not found" Dec 13 14:31:06.847699 kubelet[1936]: E1213 14:31:06.847599 1936 log.go:32] "ExecSync cmd from runtime service failed" err="rpc error: code = NotFound desc = failed to exec in container: failed to load task: no running task found: task e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9 not found: not found" containerID="e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9" cmd=["/bin/calico-node","-bird-ready","-felix-ready"] Dec 13 14:31:06.851507 env[1202]: time="2024-12-13T14:31:06.851455085Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3141 runtime=io.containerd.runc.v2\n" Dec 13 14:31:06.891271 env[1202]: time="2024-12-13T14:31:06.891229772Z" level=info msg="StopPodSandbox for \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\"" Dec 13 14:31:06.939018 env[1202]: time="2024-12-13T14:31:06.938947870Z" level=error msg="StopPodSandbox for \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\" failed" error="failed to destroy network for sandbox \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:06.939236 kubelet[1936]: E1213 14:31:06.939184 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Dec 13 14:31:06.939285 kubelet[1936]: E1213 14:31:06.939245 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943"} Dec 13 14:31:06.939316 kubelet[1936]: E1213 14:31:06.939304 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"aa1c80dd-0a17-4c41-926a-b2ddc897d0c9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:06.939382 kubelet[1936]: E1213 14:31:06.939332 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"aa1c80dd-0a17-4c41-926a-b2ddc897d0c9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-h5wrj" podUID="aa1c80dd-0a17-4c41-926a-b2ddc897d0c9" Dec 13 14:31:07.564880 kubelet[1936]: I1213 14:31:07.564814 1936 scope.go:117] "RemoveContainer" containerID="e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9" Dec 13 14:31:07.565257 kubelet[1936]: E1213 14:31:07.564939 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:07.568149 env[1202]: time="2024-12-13T14:31:07.568097218Z" level=info msg="CreateContainer within sandbox \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\" for container &ContainerMetadata{Name:calico-node,Attempt:1,}" Dec 13 14:31:07.649805 env[1202]: time="2024-12-13T14:31:07.649736464Z" level=info msg="CreateContainer within sandbox \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\" for &ContainerMetadata{Name:calico-node,Attempt:1,} returns container id \"3857c6cd7a315c558eb8c78125cc43ab7b967a4c046b8432660492539318db94\"" Dec 13 14:31:07.650289 env[1202]: time="2024-12-13T14:31:07.650259487Z" level=info msg="StartContainer for \"3857c6cd7a315c558eb8c78125cc43ab7b967a4c046b8432660492539318db94\"" Dec 13 14:31:07.667717 systemd[1]: Started cri-containerd-3857c6cd7a315c558eb8c78125cc43ab7b967a4c046b8432660492539318db94.scope. Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f43f416d608 items=0 ppid=2387 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:07.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338353763366364376133313563353538656238633738313235636334 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit: BPF prog-id=142 op=LOAD Dec 13 14:31:07.681000 audit[3184]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027e378 items=0 ppid=2387 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:07.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338353763366364376133313563353538656238633738313235636334 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit: BPF prog-id=143 op=LOAD Dec 13 14:31:07.681000 audit[3184]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027e3c8 items=0 ppid=2387 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:07.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338353763366364376133313563353538656238633738313235636334 Dec 13 14:31:07.681000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:31:07.681000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:07.681000 audit: BPF prog-id=144 op=LOAD Dec 13 14:31:07.681000 audit[3184]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027e458 items=0 ppid=2387 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:07.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338353763366364376133313563353538656238633738313235636334 Dec 13 14:31:07.787049 env[1202]: time="2024-12-13T14:31:07.786969127Z" level=info msg="StartContainer for \"3857c6cd7a315c558eb8c78125cc43ab7b967a4c046b8432660492539318db94\" returns successfully" Dec 13 14:31:07.834875 systemd[1]: cri-containerd-3857c6cd7a315c558eb8c78125cc43ab7b967a4c046b8432660492539318db94.scope: Deactivated successfully. Dec 13 14:31:07.838000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:31:07.851932 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3857c6cd7a315c558eb8c78125cc43ab7b967a4c046b8432660492539318db94-rootfs.mount: Deactivated successfully. Dec 13 14:31:07.889672 env[1202]: time="2024-12-13T14:31:07.889612462Z" level=info msg="shim disconnected" id=3857c6cd7a315c558eb8c78125cc43ab7b967a4c046b8432660492539318db94 Dec 13 14:31:07.889672 env[1202]: time="2024-12-13T14:31:07.889653208Z" level=warning msg="cleaning up after shim disconnected" id=3857c6cd7a315c558eb8c78125cc43ab7b967a4c046b8432660492539318db94 namespace=k8s.io Dec 13 14:31:07.889672 env[1202]: time="2024-12-13T14:31:07.889661724Z" level=info msg="cleaning up dead shim" Dec 13 14:31:07.893370 env[1202]: time="2024-12-13T14:31:07.893341355Z" level=info msg="StopPodSandbox for \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\"" Dec 13 14:31:07.893532 env[1202]: time="2024-12-13T14:31:07.893461790Z" level=info msg="StopPodSandbox for \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\"" Dec 13 14:31:07.894462 env[1202]: time="2024-12-13T14:31:07.894438465Z" level=info msg="StopPodSandbox for \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\"" Dec 13 14:31:07.894738 env[1202]: time="2024-12-13T14:31:07.893351313Z" level=info msg="StopPodSandbox for \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\"" Dec 13 14:31:07.904753 env[1202]: time="2024-12-13T14:31:07.904689718Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3229 runtime=io.containerd.runc.v2\n" Dec 13 14:31:07.930311 env[1202]: time="2024-12-13T14:31:07.930238080Z" level=error msg="StopPodSandbox for \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\" failed" error="failed to destroy network for sandbox \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:07.930475 kubelet[1936]: E1213 14:31:07.930440 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Dec 13 14:31:07.930539 kubelet[1936]: E1213 14:31:07.930486 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3"} Dec 13 14:31:07.930539 kubelet[1936]: E1213 14:31:07.930519 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f39245bb-41cd-43ab-822c-851b5676f474\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:07.930629 kubelet[1936]: E1213 14:31:07.930541 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f39245bb-41cd-43ab-822c-851b5676f474\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65c546cf68-4mhg9" podUID="f39245bb-41cd-43ab-822c-851b5676f474" Dec 13 14:31:07.938474 env[1202]: time="2024-12-13T14:31:07.938403615Z" level=error msg="StopPodSandbox for \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\" failed" error="failed to destroy network for sandbox \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:07.938668 kubelet[1936]: E1213 14:31:07.938625 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Dec 13 14:31:07.938729 kubelet[1936]: E1213 14:31:07.938676 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6"} Dec 13 14:31:07.938729 kubelet[1936]: E1213 14:31:07.938708 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f0a57d84-e132-4284-94a6-b96e0303f6d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:07.938829 kubelet[1936]: E1213 14:31:07.938728 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f0a57d84-e132-4284-94a6-b96e0303f6d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-wrcpk" podUID="f0a57d84-e132-4284-94a6-b96e0303f6d5" Dec 13 14:31:07.946454 env[1202]: time="2024-12-13T14:31:07.946407237Z" level=error msg="StopPodSandbox for \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\" failed" error="failed to destroy network for sandbox \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:07.946618 kubelet[1936]: E1213 14:31:07.946556 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Dec 13 14:31:07.946618 kubelet[1936]: E1213 14:31:07.946617 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7"} Dec 13 14:31:07.946698 kubelet[1936]: E1213 14:31:07.946639 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"70b747ec-d344-4421-ac6c-6b613f04fea5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:07.946698 kubelet[1936]: E1213 14:31:07.946656 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"70b747ec-d344-4421-ac6c-6b613f04fea5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2zzf8" podUID="70b747ec-d344-4421-ac6c-6b613f04fea5" Dec 13 14:31:07.948950 env[1202]: time="2024-12-13T14:31:07.948915628Z" level=error msg="StopPodSandbox for \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\" failed" error="failed to destroy network for sandbox \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:07.949061 kubelet[1936]: E1213 14:31:07.949038 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Dec 13 14:31:07.949098 kubelet[1936]: E1213 14:31:07.949063 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe"} Dec 13 14:31:07.949124 kubelet[1936]: E1213 14:31:07.949107 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0076d11e-8179-4a1b-b0bb-1e2f984b0e09\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:07.949176 kubelet[1936]: E1213 14:31:07.949123 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0076d11e-8179-4a1b-b0bb-1e2f984b0e09\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-856cb6d94c-5hc9r" podUID="0076d11e-8179-4a1b-b0bb-1e2f984b0e09" Dec 13 14:31:08.568694 kubelet[1936]: I1213 14:31:08.568654 1936 scope.go:117] "RemoveContainer" containerID="e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9" Dec 13 14:31:08.569137 kubelet[1936]: I1213 14:31:08.569018 1936 scope.go:117] "RemoveContainer" containerID="3857c6cd7a315c558eb8c78125cc43ab7b967a4c046b8432660492539318db94" Dec 13 14:31:08.569137 kubelet[1936]: E1213 14:31:08.569074 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:08.569250 kubelet[1936]: E1213 14:31:08.569148 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-fqztt_calico-system(bab07e1c-a944-4127-8061-98b2db303c4c)\"" pod="calico-system/calico-node-fqztt" podUID="bab07e1c-a944-4127-8061-98b2db303c4c" Dec 13 14:31:08.570477 env[1202]: time="2024-12-13T14:31:08.570436860Z" level=info msg="RemoveContainer for \"e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9\"" Dec 13 14:31:08.644548 env[1202]: time="2024-12-13T14:31:08.644490486Z" level=info msg="RemoveContainer for \"e7816f4c6e156d1b6dba40c9df5200342a6b30beaf442703ef51f7c82856c3b9\" returns successfully" Dec 13 14:31:09.572132 kubelet[1936]: I1213 14:31:09.572086 1936 scope.go:117] "RemoveContainer" containerID="3857c6cd7a315c558eb8c78125cc43ab7b967a4c046b8432660492539318db94" Dec 13 14:31:09.572489 kubelet[1936]: E1213 14:31:09.572147 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:09.572489 kubelet[1936]: E1213 14:31:09.572220 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-fqztt_calico-system(bab07e1c-a944-4127-8061-98b2db303c4c)\"" pod="calico-system/calico-node-fqztt" podUID="bab07e1c-a944-4127-8061-98b2db303c4c" Dec 13 14:31:09.835088 systemd[1]: Started sshd@10-10.0.0.133:22-10.0.0.1:59362.service. Dec 13 14:31:09.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.133:22-10.0.0.1:59362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:09.849068 kernel: kauditd_printk_skb: 89 callbacks suppressed Dec 13 14:31:09.849133 kernel: audit: type=1130 audit(1734100269.834:1039): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.133:22-10.0.0.1:59362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:09.886000 audit[3338]: USER_ACCT pid=3338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:09.887337 sshd[3338]: Accepted publickey for core from 10.0.0.1 port 59362 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:31:09.889446 sshd[3338]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:09.888000 audit[3338]: CRED_ACQ pid=3338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:09.892593 env[1202]: time="2024-12-13T14:31:09.892561505Z" level=info msg="StopPodSandbox for \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\"" Dec 13 14:31:09.894058 systemd[1]: Started session-11.scope. Dec 13 14:31:09.894512 systemd-logind[1194]: New session 11 of user core. Dec 13 14:31:09.895802 kernel: audit: type=1101 audit(1734100269.886:1040): pid=3338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:09.895927 kernel: audit: type=1103 audit(1734100269.888:1041): pid=3338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:09.888000 audit[3338]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee786f2c0 a2=3 a3=0 items=0 ppid=1 pid=3338 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:09.904812 kernel: audit: type=1006 audit(1734100269.888:1042): pid=3338 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 14:31:09.904918 kernel: audit: type=1300 audit(1734100269.888:1042): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee786f2c0 a2=3 a3=0 items=0 ppid=1 pid=3338 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:09.904954 kernel: audit: type=1327 audit(1734100269.888:1042): proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:09.888000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:09.899000 audit[3338]: USER_START pid=3338 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:09.911056 kernel: audit: type=1105 audit(1734100269.899:1043): pid=3338 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:09.911120 kernel: audit: type=1103 audit(1734100269.901:1044): pid=3356 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:09.901000 audit[3356]: CRED_ACQ pid=3356 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:09.919179 env[1202]: time="2024-12-13T14:31:09.919104977Z" level=error msg="StopPodSandbox for \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\" failed" error="failed to destroy network for sandbox \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:09.919401 kubelet[1936]: E1213 14:31:09.919354 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Dec 13 14:31:09.919466 kubelet[1936]: E1213 14:31:09.919411 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0"} Dec 13 14:31:09.919466 kubelet[1936]: E1213 14:31:09.919445 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ecb2651e-9af3-4fc2-95b6-4b69df48c1c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:09.919600 kubelet[1936]: E1213 14:31:09.919467 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ecb2651e-9af3-4fc2-95b6-4b69df48c1c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65c546cf68-5bqp7" podUID="ecb2651e-9af3-4fc2-95b6-4b69df48c1c1" Dec 13 14:31:10.006644 sshd[3338]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:10.007000 audit[3338]: USER_END pid=3338 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:10.010453 systemd[1]: sshd@10-10.0.0.133:22-10.0.0.1:59362.service: Deactivated successfully. Dec 13 14:31:10.011222 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:31:10.011900 systemd-logind[1194]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:31:10.007000 audit[3338]: CRED_DISP pid=3338 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:10.013373 systemd[1]: Started sshd@11-10.0.0.133:22-10.0.0.1:59370.service. Dec 13 14:31:10.014704 systemd-logind[1194]: Removed session 11. Dec 13 14:31:10.017023 kernel: audit: type=1106 audit(1734100270.007:1045): pid=3338 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:10.017085 kernel: audit: type=1104 audit(1734100270.007:1046): pid=3338 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:10.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.133:22-10.0.0.1:59362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.133:22-10.0.0.1:59370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.049000 audit[3377]: USER_ACCT pid=3377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:10.050309 sshd[3377]: Accepted publickey for core from 10.0.0.1 port 59370 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:31:10.050000 audit[3377]: CRED_ACQ pid=3377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:10.050000 audit[3377]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee3811460 a2=3 a3=0 items=0 ppid=1 pid=3377 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:10.050000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:10.051478 sshd[3377]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:10.054805 systemd-logind[1194]: New session 12 of user core. Dec 13 14:31:10.055562 systemd[1]: Started session-12.scope. Dec 13 14:31:10.058000 audit[3377]: USER_START pid=3377 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:10.060000 audit[3379]: CRED_ACQ pid=3379 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:10.218263 sshd[3377]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:10.218000 audit[3377]: USER_END pid=3377 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:10.218000 audit[3377]: CRED_DISP pid=3377 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:10.221294 systemd[1]: sshd@11-10.0.0.133:22-10.0.0.1:59370.service: Deactivated successfully. Dec 13 14:31:10.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.133:22-10.0.0.1:59370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.222052 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:31:10.222642 systemd-logind[1194]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:31:10.223810 systemd[1]: Started sshd@12-10.0.0.133:22-10.0.0.1:59372.service. Dec 13 14:31:10.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.133:22-10.0.0.1:59372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.225078 systemd-logind[1194]: Removed session 12. Dec 13 14:31:10.262000 audit[3388]: USER_ACCT pid=3388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:10.263881 sshd[3388]: Accepted publickey for core from 10.0.0.1 port 59372 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:31:10.263000 audit[3388]: CRED_ACQ pid=3388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:10.263000 audit[3388]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce8f43e40 a2=3 a3=0 items=0 ppid=1 pid=3388 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:10.263000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:10.265071 sshd[3388]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:10.268668 systemd-logind[1194]: New session 13 of user core. Dec 13 14:31:10.269512 systemd[1]: Started session-13.scope. Dec 13 14:31:10.273000 audit[3388]: USER_START pid=3388 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:10.274000 audit[3390]: CRED_ACQ pid=3390 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:10.378347 sshd[3388]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:10.378000 audit[3388]: USER_END pid=3388 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:10.378000 audit[3388]: CRED_DISP pid=3388 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:10.381127 systemd[1]: sshd@12-10.0.0.133:22-10.0.0.1:59372.service: Deactivated successfully. Dec 13 14:31:10.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.133:22-10.0.0.1:59372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.382007 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:31:10.382577 systemd-logind[1194]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:31:10.383338 systemd-logind[1194]: Removed session 13. Dec 13 14:31:15.382367 systemd[1]: Started sshd@13-10.0.0.133:22-10.0.0.1:59384.service. Dec 13 14:31:15.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.133:22-10.0.0.1:59384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:15.383684 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:31:15.383758 kernel: audit: type=1130 audit(1734100275.381:1066): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.133:22-10.0.0.1:59384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:15.419000 audit[3401]: USER_ACCT pid=3401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:15.420120 sshd[3401]: Accepted publickey for core from 10.0.0.1 port 59384 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:31:15.423000 audit[3401]: CRED_ACQ pid=3401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:15.424332 sshd[3401]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:15.427466 systemd-logind[1194]: New session 14 of user core. Dec 13 14:31:15.428156 kernel: audit: type=1101 audit(1734100275.419:1067): pid=3401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:15.428215 kernel: audit: type=1103 audit(1734100275.423:1068): pid=3401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:15.428245 kernel: audit: type=1006 audit(1734100275.423:1069): pid=3401 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 14:31:15.428208 systemd[1]: Started session-14.scope. Dec 13 14:31:15.423000 audit[3401]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0b5bd7d0 a2=3 a3=0 items=0 ppid=1 pid=3401 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:15.435292 kernel: audit: type=1300 audit(1734100275.423:1069): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0b5bd7d0 a2=3 a3=0 items=0 ppid=1 pid=3401 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:15.435348 kernel: audit: type=1327 audit(1734100275.423:1069): proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:15.423000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:15.431000 audit[3401]: USER_START pid=3401 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:15.440941 kernel: audit: type=1105 audit(1734100275.431:1070): pid=3401 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:15.440988 kernel: audit: type=1103 audit(1734100275.433:1071): pid=3403 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:15.433000 audit[3403]: CRED_ACQ pid=3403 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:15.531134 sshd[3401]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:15.531000 audit[3401]: USER_END pid=3401 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:15.533247 systemd[1]: sshd@13-10.0.0.133:22-10.0.0.1:59384.service: Deactivated successfully. Dec 13 14:31:15.534095 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:31:15.531000 audit[3401]: CRED_DISP pid=3401 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:15.539302 systemd-logind[1194]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:31:15.539947 systemd-logind[1194]: Removed session 14. Dec 13 14:31:15.540376 kernel: audit: type=1106 audit(1734100275.531:1072): pid=3401 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:15.540419 kernel: audit: type=1104 audit(1734100275.531:1073): pid=3401 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:15.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.133:22-10.0.0.1:59384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:18.892328 env[1202]: time="2024-12-13T14:31:18.892251527Z" level=info msg="StopPodSandbox for \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\"" Dec 13 14:31:18.918514 env[1202]: time="2024-12-13T14:31:18.918434083Z" level=error msg="StopPodSandbox for \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\" failed" error="failed to destroy network for sandbox \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:18.918774 kubelet[1936]: E1213 14:31:18.918711 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Dec 13 14:31:18.919083 kubelet[1936]: E1213 14:31:18.918783 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943"} Dec 13 14:31:18.919083 kubelet[1936]: E1213 14:31:18.918827 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"aa1c80dd-0a17-4c41-926a-b2ddc897d0c9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:18.919083 kubelet[1936]: E1213 14:31:18.918878 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"aa1c80dd-0a17-4c41-926a-b2ddc897d0c9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-h5wrj" podUID="aa1c80dd-0a17-4c41-926a-b2ddc897d0c9" Dec 13 14:31:19.294000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:19.294000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:19.294000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0029d60c0 a2=fc6 a3=0 items=0 ppid=1674 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 key=(null) Dec 13 14:31:19.294000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:31:19.294000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001b78390 a2=fc6 a3=0 items=0 ppid=1674 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 key=(null) Dec 13 14:31:19.294000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:31:19.582000 audit[1786]: AVC avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:19.582000 audit[1786]: AVC avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:19.582000 audit[1786]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c006f49120 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:31:19.582000 audit[1786]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c008d34210 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:31:19.582000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:31:19.582000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:31:19.588000 audit[1786]: AVC avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:19.588000 audit[1786]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c008d34270 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:31:19.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:31:19.588000 audit[1786]: AVC avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:19.588000 audit[1786]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c006f49140 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:31:19.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:31:19.589000 audit[1786]: AVC avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:19.589000 audit[1786]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0081e0c60 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:31:19.589000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:31:19.589000 audit[1786]: AVC avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:19.589000 audit[1786]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c008d342d0 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:31:19.589000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:31:20.534972 systemd[1]: Started sshd@14-10.0.0.133:22-10.0.0.1:51670.service. Dec 13 14:31:20.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.133:22-10.0.0.1:51670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:20.535987 kernel: kauditd_printk_skb: 25 callbacks suppressed Dec 13 14:31:20.536019 kernel: audit: type=1130 audit(1734100280.534:1083): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.133:22-10.0.0.1:51670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:20.570000 audit[3437]: USER_ACCT pid=3437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:20.571766 sshd[3437]: Accepted publickey for core from 10.0.0.1 port 51670 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:31:20.574000 audit[3437]: CRED_ACQ pid=3437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:20.575995 sshd[3437]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:20.579472 kernel: audit: type=1101 audit(1734100280.570:1084): pid=3437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:20.579538 kernel: audit: type=1103 audit(1734100280.574:1085): pid=3437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:20.579587 kernel: audit: type=1006 audit(1734100280.574:1086): pid=3437 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:31:20.579172 systemd-logind[1194]: New session 15 of user core. Dec 13 14:31:20.579948 systemd[1]: Started session-15.scope. Dec 13 14:31:20.574000 audit[3437]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1c3f6da0 a2=3 a3=0 items=0 ppid=1 pid=3437 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.585893 kernel: audit: type=1300 audit(1734100280.574:1086): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1c3f6da0 a2=3 a3=0 items=0 ppid=1 pid=3437 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.585958 kernel: audit: type=1327 audit(1734100280.574:1086): proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:20.574000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:20.584000 audit[3437]: USER_START pid=3437 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:20.591987 kernel: audit: type=1105 audit(1734100280.584:1087): pid=3437 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:20.592046 kernel: audit: type=1103 audit(1734100280.585:1088): pid=3439 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:20.585000 audit[3439]: CRED_ACQ pid=3439 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:20.682302 sshd[3437]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:20.682000 audit[3437]: USER_END pid=3437 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:20.684616 systemd[1]: sshd@14-10.0.0.133:22-10.0.0.1:51670.service: Deactivated successfully. Dec 13 14:31:20.685393 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:31:20.686454 systemd-logind[1194]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:31:20.687154 systemd-logind[1194]: Removed session 15. Dec 13 14:31:20.687893 kernel: audit: type=1106 audit(1734100280.682:1089): pid=3437 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:20.687953 kernel: audit: type=1104 audit(1734100280.682:1090): pid=3437 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:20.682000 audit[3437]: CRED_DISP pid=3437 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:20.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.133:22-10.0.0.1:51670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:20.891890 env[1202]: time="2024-12-13T14:31:20.891820376Z" level=info msg="StopPodSandbox for \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\"" Dec 13 14:31:20.913619 env[1202]: time="2024-12-13T14:31:20.913558127Z" level=error msg="StopPodSandbox for \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\" failed" error="failed to destroy network for sandbox \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:20.913862 kubelet[1936]: E1213 14:31:20.913792 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Dec 13 14:31:20.914162 kubelet[1936]: E1213 14:31:20.913864 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3"} Dec 13 14:31:20.914162 kubelet[1936]: E1213 14:31:20.913906 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f39245bb-41cd-43ab-822c-851b5676f474\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:20.914162 kubelet[1936]: E1213 14:31:20.913938 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f39245bb-41cd-43ab-822c-851b5676f474\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65c546cf68-4mhg9" podUID="f39245bb-41cd-43ab-822c-851b5676f474" Dec 13 14:31:21.892131 env[1202]: time="2024-12-13T14:31:21.892082618Z" level=info msg="StopPodSandbox for \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\"" Dec 13 14:31:21.892594 env[1202]: time="2024-12-13T14:31:21.892563861Z" level=info msg="StopPodSandbox for \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\"" Dec 13 14:31:21.892879 env[1202]: time="2024-12-13T14:31:21.892814943Z" level=info msg="StopPodSandbox for \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\"" Dec 13 14:31:21.893118 env[1202]: time="2024-12-13T14:31:21.893078407Z" level=info msg="StopPodSandbox for \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\"" Dec 13 14:31:21.939676 env[1202]: time="2024-12-13T14:31:21.939609180Z" level=error msg="StopPodSandbox for \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\" failed" error="failed to destroy network for sandbox \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:21.939834 kubelet[1936]: E1213 14:31:21.939788 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Dec 13 14:31:21.940186 kubelet[1936]: E1213 14:31:21.939856 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0"} Dec 13 14:31:21.940186 kubelet[1936]: E1213 14:31:21.939907 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ecb2651e-9af3-4fc2-95b6-4b69df48c1c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:21.940186 kubelet[1936]: E1213 14:31:21.939935 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ecb2651e-9af3-4fc2-95b6-4b69df48c1c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65c546cf68-5bqp7" podUID="ecb2651e-9af3-4fc2-95b6-4b69df48c1c1" Dec 13 14:31:21.944017 env[1202]: time="2024-12-13T14:31:21.943965163Z" level=error msg="StopPodSandbox for \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\" failed" error="failed to destroy network for sandbox \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:21.944467 kubelet[1936]: E1213 14:31:21.944307 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Dec 13 14:31:21.944467 kubelet[1936]: E1213 14:31:21.944358 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe"} Dec 13 14:31:21.944467 kubelet[1936]: E1213 14:31:21.944394 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0076d11e-8179-4a1b-b0bb-1e2f984b0e09\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:21.944467 kubelet[1936]: E1213 14:31:21.944418 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0076d11e-8179-4a1b-b0bb-1e2f984b0e09\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-856cb6d94c-5hc9r" podUID="0076d11e-8179-4a1b-b0bb-1e2f984b0e09" Dec 13 14:31:21.945725 env[1202]: time="2024-12-13T14:31:21.945688137Z" level=error msg="StopPodSandbox for \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\" failed" error="failed to destroy network for sandbox \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:21.946124 kubelet[1936]: E1213 14:31:21.946089 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Dec 13 14:31:21.946124 kubelet[1936]: E1213 14:31:21.946130 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7"} Dec 13 14:31:21.946254 kubelet[1936]: E1213 14:31:21.946165 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"70b747ec-d344-4421-ac6c-6b613f04fea5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:21.946254 kubelet[1936]: E1213 14:31:21.946189 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"70b747ec-d344-4421-ac6c-6b613f04fea5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2zzf8" podUID="70b747ec-d344-4421-ac6c-6b613f04fea5" Dec 13 14:31:21.949301 env[1202]: time="2024-12-13T14:31:21.949250872Z" level=error msg="StopPodSandbox for \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\" failed" error="failed to destroy network for sandbox \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:21.949412 kubelet[1936]: E1213 14:31:21.949381 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Dec 13 14:31:21.949466 kubelet[1936]: E1213 14:31:21.949425 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6"} Dec 13 14:31:21.949466 kubelet[1936]: E1213 14:31:21.949454 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f0a57d84-e132-4284-94a6-b96e0303f6d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:21.949550 kubelet[1936]: E1213 14:31:21.949474 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f0a57d84-e132-4284-94a6-b96e0303f6d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-wrcpk" podUID="f0a57d84-e132-4284-94a6-b96e0303f6d5" Dec 13 14:31:22.861671 kubelet[1936]: I1213 14:31:22.861636 1936 scope.go:117] "RemoveContainer" containerID="3857c6cd7a315c558eb8c78125cc43ab7b967a4c046b8432660492539318db94" Dec 13 14:31:22.861887 kubelet[1936]: E1213 14:31:22.861718 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:22.863275 env[1202]: time="2024-12-13T14:31:22.863238706Z" level=info msg="CreateContainer within sandbox \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\" for container &ContainerMetadata{Name:calico-node,Attempt:2,}" Dec 13 14:31:22.880043 env[1202]: time="2024-12-13T14:31:22.879995708Z" level=info msg="CreateContainer within sandbox \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\" for &ContainerMetadata{Name:calico-node,Attempt:2,} returns container id \"20db524a80bd6100e9badbc9ccec52a5bab647f4ccb87467bcedb5597b0bc81f\"" Dec 13 14:31:22.880592 env[1202]: time="2024-12-13T14:31:22.880564576Z" level=info msg="StartContainer for \"20db524a80bd6100e9badbc9ccec52a5bab647f4ccb87467bcedb5597b0bc81f\"" Dec 13 14:31:22.901816 systemd[1]: Started cri-containerd-20db524a80bd6100e9badbc9ccec52a5bab647f4ccb87467bcedb5597b0bc81f.scope. Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { perfmon } for pid=3576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f373a9f4468 items=0 ppid=2387 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:22.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230646235323461383062643631303065396261646263396363656335 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { bpf } for pid=3576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { bpf } for pid=3576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { bpf } for pid=3576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { perfmon } for pid=3576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { perfmon } for pid=3576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { perfmon } for pid=3576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { perfmon } for pid=3576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { perfmon } for pid=3576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { bpf } for pid=3576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { bpf } for pid=3576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit: BPF prog-id=145 op=LOAD Dec 13 14:31:22.915000 audit[3576]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002bdff8 items=0 ppid=2387 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:22.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230646235323461383062643631303065396261646263396363656335 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { bpf } for pid=3576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { bpf } for pid=3576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { perfmon } for pid=3576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { perfmon } for pid=3576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { perfmon } for pid=3576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { perfmon } for pid=3576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { perfmon } for pid=3576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { bpf } for pid=3576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { bpf } for pid=3576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit: BPF prog-id=146 op=LOAD Dec 13 14:31:22.915000 audit[3576]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00032e048 items=0 ppid=2387 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:22.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230646235323461383062643631303065396261646263396363656335 Dec 13 14:31:22.915000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:31:22.915000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { bpf } for pid=3576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { bpf } for pid=3576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { bpf } for pid=3576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { perfmon } for pid=3576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { perfmon } for pid=3576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { perfmon } for pid=3576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { perfmon } for pid=3576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { perfmon } for pid=3576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { bpf } for pid=3576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit[3576]: AVC avc: denied { bpf } for pid=3576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.915000 audit: BPF prog-id=147 op=LOAD Dec 13 14:31:22.915000 audit[3576]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00032e0d8 items=0 ppid=2387 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:22.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230646235323461383062643631303065396261646263396363656335 Dec 13 14:31:22.928602 env[1202]: time="2024-12-13T14:31:22.928553993Z" level=info msg="StartContainer for \"20db524a80bd6100e9badbc9ccec52a5bab647f4ccb87467bcedb5597b0bc81f\" returns successfully" Dec 13 14:31:22.976079 systemd[1]: cri-containerd-20db524a80bd6100e9badbc9ccec52a5bab647f4ccb87467bcedb5597b0bc81f.scope: Deactivated successfully. Dec 13 14:31:22.980000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:31:22.993878 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-20db524a80bd6100e9badbc9ccec52a5bab647f4ccb87467bcedb5597b0bc81f-rootfs.mount: Deactivated successfully. Dec 13 14:31:22.998996 env[1202]: time="2024-12-13T14:31:22.998936067Z" level=info msg="shim disconnected" id=20db524a80bd6100e9badbc9ccec52a5bab647f4ccb87467bcedb5597b0bc81f Dec 13 14:31:22.998996 env[1202]: time="2024-12-13T14:31:22.998992333Z" level=warning msg="cleaning up after shim disconnected" id=20db524a80bd6100e9badbc9ccec52a5bab647f4ccb87467bcedb5597b0bc81f namespace=k8s.io Dec 13 14:31:22.999124 env[1202]: time="2024-12-13T14:31:22.999001721Z" level=info msg="cleaning up dead shim" Dec 13 14:31:23.005850 env[1202]: time="2024-12-13T14:31:23.005796560Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3619 runtime=io.containerd.runc.v2\n" Dec 13 14:31:23.596752 kubelet[1936]: I1213 14:31:23.596687 1936 scope.go:117] "RemoveContainer" containerID="3857c6cd7a315c558eb8c78125cc43ab7b967a4c046b8432660492539318db94" Dec 13 14:31:23.597342 kubelet[1936]: I1213 14:31:23.597042 1936 scope.go:117] "RemoveContainer" containerID="20db524a80bd6100e9badbc9ccec52a5bab647f4ccb87467bcedb5597b0bc81f" Dec 13 14:31:23.597342 kubelet[1936]: E1213 14:31:23.597100 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:23.597342 kubelet[1936]: E1213 14:31:23.597222 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-fqztt_calico-system(bab07e1c-a944-4127-8061-98b2db303c4c)\"" pod="calico-system/calico-node-fqztt" podUID="bab07e1c-a944-4127-8061-98b2db303c4c" Dec 13 14:31:23.599391 env[1202]: time="2024-12-13T14:31:23.599336285Z" level=info msg="RemoveContainer for \"3857c6cd7a315c558eb8c78125cc43ab7b967a4c046b8432660492539318db94\"" Dec 13 14:31:23.603065 env[1202]: time="2024-12-13T14:31:23.603026690Z" level=info msg="RemoveContainer for \"3857c6cd7a315c558eb8c78125cc43ab7b967a4c046b8432660492539318db94\" returns successfully" Dec 13 14:31:23.946000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:23.946000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002333660 a2=fc6 a3=0 items=0 ppid=1674 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 key=(null) Dec 13 14:31:23.946000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:31:23.946000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:23.946000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023f5f60 a2=fc6 a3=0 items=0 ppid=1674 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 key=(null) Dec 13 14:31:23.946000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:31:23.946000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:23.946000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023f5f80 a2=fc6 a3=0 items=0 ppid=1674 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 key=(null) Dec 13 14:31:23.946000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:31:23.947000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:31:23.947000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0029d74c0 a2=fc6 a3=0 items=0 ppid=1674 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 key=(null) Dec 13 14:31:23.947000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:31:25.686569 systemd[1]: Started sshd@15-10.0.0.133:22-10.0.0.1:51674.service. Dec 13 14:31:25.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.133:22-10.0.0.1:51674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:25.687788 kernel: kauditd_printk_skb: 57 callbacks suppressed Dec 13 14:31:25.687863 kernel: audit: type=1130 audit(1734100285.685:1103): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.133:22-10.0.0.1:51674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:25.726000 audit[3632]: USER_ACCT pid=3632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:25.727205 sshd[3632]: Accepted publickey for core from 10.0.0.1 port 51674 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:31:25.729376 sshd[3632]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:25.728000 audit[3632]: CRED_ACQ pid=3632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:25.733098 systemd-logind[1194]: New session 16 of user core. Dec 13 14:31:25.733878 systemd[1]: Started session-16.scope. Dec 13 14:31:25.735272 kernel: audit: type=1101 audit(1734100285.726:1104): pid=3632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:25.735427 kernel: audit: type=1103 audit(1734100285.728:1105): pid=3632 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:25.735464 kernel: audit: type=1006 audit(1734100285.728:1106): pid=3632 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:31:25.728000 audit[3632]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd12d21930 a2=3 a3=0 items=0 ppid=1 pid=3632 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:25.742088 kernel: audit: type=1300 audit(1734100285.728:1106): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd12d21930 a2=3 a3=0 items=0 ppid=1 pid=3632 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:25.742131 kernel: audit: type=1327 audit(1734100285.728:1106): proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:25.728000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:25.737000 audit[3632]: USER_START pid=3632 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:25.748081 kernel: audit: type=1105 audit(1734100285.737:1107): pid=3632 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:25.748123 kernel: audit: type=1103 audit(1734100285.739:1108): pid=3634 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:25.739000 audit[3634]: CRED_ACQ pid=3634 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:25.855825 sshd[3632]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:25.856000 audit[3632]: USER_END pid=3632 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:25.858329 systemd[1]: sshd@15-10.0.0.133:22-10.0.0.1:51674.service: Deactivated successfully. Dec 13 14:31:25.859044 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:31:25.859495 systemd-logind[1194]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:31:25.860182 systemd-logind[1194]: Removed session 16. Dec 13 14:31:25.856000 audit[3632]: CRED_DISP pid=3632 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:25.868202 kernel: audit: type=1106 audit(1734100285.856:1109): pid=3632 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:25.868269 kernel: audit: type=1104 audit(1734100285.856:1110): pid=3632 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:25.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.133:22-10.0.0.1:51674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:28.924008 kubelet[1936]: I1213 14:31:28.923957 1936 scope.go:117] "RemoveContainer" containerID="20db524a80bd6100e9badbc9ccec52a5bab647f4ccb87467bcedb5597b0bc81f" Dec 13 14:31:28.924349 kubelet[1936]: E1213 14:31:28.924035 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:28.924349 kubelet[1936]: E1213 14:31:28.924113 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-fqztt_calico-system(bab07e1c-a944-4127-8061-98b2db303c4c)\"" pod="calico-system/calico-node-fqztt" podUID="bab07e1c-a944-4127-8061-98b2db303c4c" Dec 13 14:31:30.860460 systemd[1]: Started sshd@16-10.0.0.133:22-10.0.0.1:46314.service. Dec 13 14:31:30.861643 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:31:30.861692 kernel: audit: type=1130 audit(1734100290.859:1112): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.133:22-10.0.0.1:46314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:30.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.133:22-10.0.0.1:46314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:30.896000 audit[3648]: USER_ACCT pid=3648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:30.897031 sshd[3648]: Accepted publickey for core from 10.0.0.1 port 46314 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:31:30.900853 kernel: audit: type=1101 audit(1734100290.896:1113): pid=3648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:30.900000 audit[3648]: CRED_ACQ pid=3648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:30.901236 sshd[3648]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:30.904702 systemd-logind[1194]: New session 17 of user core. Dec 13 14:31:30.905636 systemd[1]: Started session-17.scope. Dec 13 14:31:30.906744 kernel: audit: type=1103 audit(1734100290.900:1114): pid=3648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:30.906805 kernel: audit: type=1006 audit(1734100290.900:1115): pid=3648 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 14:31:30.906824 kernel: audit: type=1300 audit(1734100290.900:1115): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc51c8f400 a2=3 a3=0 items=0 ppid=1 pid=3648 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:30.900000 audit[3648]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc51c8f400 a2=3 a3=0 items=0 ppid=1 pid=3648 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:30.910659 kernel: audit: type=1327 audit(1734100290.900:1115): proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:30.900000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:30.909000 audit[3648]: USER_START pid=3648 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:30.916138 kernel: audit: type=1105 audit(1734100290.909:1116): pid=3648 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:30.916181 kernel: audit: type=1103 audit(1734100290.910:1117): pid=3650 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:30.910000 audit[3650]: CRED_ACQ pid=3650 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:31.012816 sshd[3648]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:31.012000 audit[3648]: USER_END pid=3648 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:31.015755 systemd[1]: sshd@16-10.0.0.133:22-10.0.0.1:46314.service: Deactivated successfully. Dec 13 14:31:31.016536 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:31:31.017482 systemd-logind[1194]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:31:31.013000 audit[3648]: CRED_DISP pid=3648 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:31.018453 systemd-logind[1194]: Removed session 17. Dec 13 14:31:31.021564 kernel: audit: type=1106 audit(1734100291.012:1118): pid=3648 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:31.021625 kernel: audit: type=1104 audit(1734100291.013:1119): pid=3648 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:31.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.133:22-10.0.0.1:46314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:32.891635 env[1202]: time="2024-12-13T14:31:32.891571088Z" level=info msg="StopPodSandbox for \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\"" Dec 13 14:31:32.892017 env[1202]: time="2024-12-13T14:31:32.891594573Z" level=info msg="StopPodSandbox for \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\"" Dec 13 14:31:32.917286 env[1202]: time="2024-12-13T14:31:32.917219896Z" level=error msg="StopPodSandbox for \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\" failed" error="failed to destroy network for sandbox \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:32.917590 env[1202]: time="2024-12-13T14:31:32.917253330Z" level=error msg="StopPodSandbox for \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\" failed" error="failed to destroy network for sandbox \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:32.917631 kubelet[1936]: E1213 14:31:32.917476 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Dec 13 14:31:32.917631 kubelet[1936]: E1213 14:31:32.917506 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Dec 13 14:31:32.917631 kubelet[1936]: E1213 14:31:32.917550 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0"} Dec 13 14:31:32.917631 kubelet[1936]: E1213 14:31:32.917564 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943"} Dec 13 14:31:32.917631 kubelet[1936]: E1213 14:31:32.917586 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ecb2651e-9af3-4fc2-95b6-4b69df48c1c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:32.918085 kubelet[1936]: E1213 14:31:32.917599 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"aa1c80dd-0a17-4c41-926a-b2ddc897d0c9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:32.918085 kubelet[1936]: E1213 14:31:32.917614 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ecb2651e-9af3-4fc2-95b6-4b69df48c1c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65c546cf68-5bqp7" podUID="ecb2651e-9af3-4fc2-95b6-4b69df48c1c1" Dec 13 14:31:32.918085 kubelet[1936]: E1213 14:31:32.917621 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"aa1c80dd-0a17-4c41-926a-b2ddc897d0c9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-h5wrj" podUID="aa1c80dd-0a17-4c41-926a-b2ddc897d0c9" Dec 13 14:31:33.892024 env[1202]: time="2024-12-13T14:31:33.891972935Z" level=info msg="StopPodSandbox for \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\"" Dec 13 14:31:33.914410 env[1202]: time="2024-12-13T14:31:33.914344040Z" level=error msg="StopPodSandbox for \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\" failed" error="failed to destroy network for sandbox \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:33.914635 kubelet[1936]: E1213 14:31:33.914579 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Dec 13 14:31:33.914701 kubelet[1936]: E1213 14:31:33.914639 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6"} Dec 13 14:31:33.914701 kubelet[1936]: E1213 14:31:33.914675 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f0a57d84-e132-4284-94a6-b96e0303f6d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:33.914796 kubelet[1936]: E1213 14:31:33.914696 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f0a57d84-e132-4284-94a6-b96e0303f6d5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-wrcpk" podUID="f0a57d84-e132-4284-94a6-b96e0303f6d5" Dec 13 14:31:35.892330 env[1202]: time="2024-12-13T14:31:35.892288180Z" level=info msg="StopPodSandbox for \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\"" Dec 13 14:31:35.917618 env[1202]: time="2024-12-13T14:31:35.917528416Z" level=error msg="StopPodSandbox for \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\" failed" error="failed to destroy network for sandbox \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:35.917917 kubelet[1936]: E1213 14:31:35.917854 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Dec 13 14:31:35.918163 kubelet[1936]: E1213 14:31:35.917925 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3"} Dec 13 14:31:35.918163 kubelet[1936]: E1213 14:31:35.917968 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f39245bb-41cd-43ab-822c-851b5676f474\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:35.918163 kubelet[1936]: E1213 14:31:35.917997 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f39245bb-41cd-43ab-822c-851b5676f474\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65c546cf68-4mhg9" podUID="f39245bb-41cd-43ab-822c-851b5676f474" Dec 13 14:31:36.017214 systemd[1]: Started sshd@17-10.0.0.133:22-10.0.0.1:46320.service. Dec 13 14:31:36.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.133:22-10.0.0.1:46320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:36.018306 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:31:36.018453 kernel: audit: type=1130 audit(1734100296.016:1121): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.133:22-10.0.0.1:46320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:36.055000 audit[3756]: USER_ACCT pid=3756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:36.056236 sshd[3756]: Accepted publickey for core from 10.0.0.1 port 46320 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:31:36.058378 sshd[3756]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:36.056000 audit[3756]: CRED_ACQ pid=3756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:36.062927 systemd-logind[1194]: New session 18 of user core. Dec 13 14:31:36.064019 systemd[1]: Started session-18.scope. Dec 13 14:31:36.064792 kernel: audit: type=1101 audit(1734100296.055:1122): pid=3756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:36.064865 kernel: audit: type=1103 audit(1734100296.056:1123): pid=3756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:36.064889 kernel: audit: type=1006 audit(1734100296.057:1124): pid=3756 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 14:31:36.057000 audit[3756]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe13e246f0 a2=3 a3=0 items=0 ppid=1 pid=3756 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:36.072015 kernel: audit: type=1300 audit(1734100296.057:1124): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe13e246f0 a2=3 a3=0 items=0 ppid=1 pid=3756 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:36.072068 kernel: audit: type=1327 audit(1734100296.057:1124): proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:36.057000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:36.068000 audit[3756]: USER_START pid=3756 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:36.077581 kernel: audit: type=1105 audit(1734100296.068:1125): pid=3756 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:36.077614 kernel: audit: type=1103 audit(1734100296.070:1126): pid=3758 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:36.070000 audit[3758]: CRED_ACQ pid=3758 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:36.173163 sshd[3756]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:36.173000 audit[3756]: USER_END pid=3756 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:36.176045 systemd[1]: sshd@17-10.0.0.133:22-10.0.0.1:46320.service: Deactivated successfully. Dec 13 14:31:36.176774 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:31:36.177313 systemd-logind[1194]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:31:36.178020 systemd-logind[1194]: Removed session 18. Dec 13 14:31:36.173000 audit[3756]: CRED_DISP pid=3756 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:36.182699 kernel: audit: type=1106 audit(1734100296.173:1127): pid=3756 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:36.182756 kernel: audit: type=1104 audit(1734100296.173:1128): pid=3756 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:36.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.133:22-10.0.0.1:46320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:36.892048 env[1202]: time="2024-12-13T14:31:36.891972000Z" level=info msg="StopPodSandbox for \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\"" Dec 13 14:31:36.892242 env[1202]: time="2024-12-13T14:31:36.892121797Z" level=info msg="StopPodSandbox for \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\"" Dec 13 14:31:36.916863 env[1202]: time="2024-12-13T14:31:36.916780918Z" level=error msg="StopPodSandbox for \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\" failed" error="failed to destroy network for sandbox \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:36.917188 kubelet[1936]: E1213 14:31:36.917032 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Dec 13 14:31:36.917188 kubelet[1936]: E1213 14:31:36.917082 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7"} Dec 13 14:31:36.917188 kubelet[1936]: E1213 14:31:36.917118 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"70b747ec-d344-4421-ac6c-6b613f04fea5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:36.917188 kubelet[1936]: E1213 14:31:36.917141 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"70b747ec-d344-4421-ac6c-6b613f04fea5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2zzf8" podUID="70b747ec-d344-4421-ac6c-6b613f04fea5" Dec 13 14:31:36.918394 env[1202]: time="2024-12-13T14:31:36.918349958Z" level=error msg="StopPodSandbox for \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\" failed" error="failed to destroy network for sandbox \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:36.918625 kubelet[1936]: E1213 14:31:36.918594 1936 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Dec 13 14:31:36.918830 kubelet[1936]: E1213 14:31:36.918632 1936 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe"} Dec 13 14:31:36.918830 kubelet[1936]: E1213 14:31:36.918651 1936 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0076d11e-8179-4a1b-b0bb-1e2f984b0e09\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:36.918830 kubelet[1936]: E1213 14:31:36.918670 1936 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0076d11e-8179-4a1b-b0bb-1e2f984b0e09\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-856cb6d94c-5hc9r" podUID="0076d11e-8179-4a1b-b0bb-1e2f984b0e09" Dec 13 14:31:39.445891 env[1202]: time="2024-12-13T14:31:39.445814365Z" level=info msg="StopPodSandbox for \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\"" Dec 13 14:31:39.449597 env[1202]: time="2024-12-13T14:31:39.445913535Z" level=info msg="Container to stop \"466eb9807613e12b5598810038feb2361fab8c96b9a87bc9f8bae1e3a9af9768\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:31:39.449597 env[1202]: time="2024-12-13T14:31:39.445927761Z" level=info msg="Container to stop \"cda2ba2f48caa20071e4f132d9345a0649525abd474499af970cf4cf1f50a79a\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:31:39.449597 env[1202]: time="2024-12-13T14:31:39.445939344Z" level=info msg="Container to stop \"20db524a80bd6100e9badbc9ccec52a5bab647f4ccb87467bcedb5597b0bc81f\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:31:39.448218 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a-shm.mount: Deactivated successfully. Dec 13 14:31:39.460789 systemd[1]: cri-containerd-a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a.scope: Deactivated successfully. Dec 13 14:31:39.460000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:31:39.465000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:31:39.478013 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a-rootfs.mount: Deactivated successfully. Dec 13 14:31:39.487691 env[1202]: time="2024-12-13T14:31:39.487641647Z" level=info msg="shim disconnected" id=a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a Dec 13 14:31:39.487952 env[1202]: time="2024-12-13T14:31:39.487932693Z" level=warning msg="cleaning up after shim disconnected" id=a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a namespace=k8s.io Dec 13 14:31:39.488032 env[1202]: time="2024-12-13T14:31:39.488014260Z" level=info msg="cleaning up dead shim" Dec 13 14:31:39.494228 env[1202]: time="2024-12-13T14:31:39.494183934Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3834 runtime=io.containerd.runc.v2\n" Dec 13 14:31:39.494707 env[1202]: time="2024-12-13T14:31:39.494681967Z" level=info msg="TearDown network for sandbox \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\" successfully" Dec 13 14:31:39.494801 env[1202]: time="2024-12-13T14:31:39.494781237Z" level=info msg="StopPodSandbox for \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\" returns successfully" Dec 13 14:31:39.534867 kubelet[1936]: E1213 14:31:39.534798 1936 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="bab07e1c-a944-4127-8061-98b2db303c4c" containerName="flexvol-driver" Dec 13 14:31:39.534867 kubelet[1936]: E1213 14:31:39.534831 1936 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="bab07e1c-a944-4127-8061-98b2db303c4c" containerName="install-cni" Dec 13 14:31:39.534867 kubelet[1936]: E1213 14:31:39.534852 1936 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="bab07e1c-a944-4127-8061-98b2db303c4c" containerName="calico-node" Dec 13 14:31:39.534867 kubelet[1936]: E1213 14:31:39.534858 1936 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="bab07e1c-a944-4127-8061-98b2db303c4c" containerName="calico-node" Dec 13 14:31:39.534867 kubelet[1936]: E1213 14:31:39.534863 1936 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="bab07e1c-a944-4127-8061-98b2db303c4c" containerName="calico-node" Dec 13 14:31:39.535373 kubelet[1936]: I1213 14:31:39.534888 1936 memory_manager.go:354] "RemoveStaleState removing state" podUID="bab07e1c-a944-4127-8061-98b2db303c4c" containerName="calico-node" Dec 13 14:31:39.535373 kubelet[1936]: I1213 14:31:39.534895 1936 memory_manager.go:354] "RemoveStaleState removing state" podUID="bab07e1c-a944-4127-8061-98b2db303c4c" containerName="calico-node" Dec 13 14:31:39.535373 kubelet[1936]: I1213 14:31:39.534900 1936 memory_manager.go:354] "RemoveStaleState removing state" podUID="bab07e1c-a944-4127-8061-98b2db303c4c" containerName="calico-node" Dec 13 14:31:39.539786 systemd[1]: Created slice kubepods-besteffort-podc40609e4_9f38_4200_9a7f_3d4159361b15.slice. Dec 13 14:31:39.604505 kubelet[1936]: I1213 14:31:39.604440 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bab07e1c-a944-4127-8061-98b2db303c4c-tigera-ca-bundle\") pod \"bab07e1c-a944-4127-8061-98b2db303c4c\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " Dec 13 14:31:39.604505 kubelet[1936]: I1213 14:31:39.604491 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-cni-net-dir\") pod \"bab07e1c-a944-4127-8061-98b2db303c4c\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " Dec 13 14:31:39.604771 kubelet[1936]: I1213 14:31:39.604687 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-var-run-calico\") pod \"bab07e1c-a944-4127-8061-98b2db303c4c\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " Dec 13 14:31:39.605058 kubelet[1936]: I1213 14:31:39.605013 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/bab07e1c-a944-4127-8061-98b2db303c4c-node-certs\") pod \"bab07e1c-a944-4127-8061-98b2db303c4c\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " Dec 13 14:31:39.605235 kubelet[1936]: I1213 14:31:39.605121 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "bab07e1c-a944-4127-8061-98b2db303c4c" (UID: "bab07e1c-a944-4127-8061-98b2db303c4c"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:39.605235 kubelet[1936]: I1213 14:31:39.605122 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "bab07e1c-a944-4127-8061-98b2db303c4c" (UID: "bab07e1c-a944-4127-8061-98b2db303c4c"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:39.605235 kubelet[1936]: I1213 14:31:39.605206 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-xtables-lock\") pod \"bab07e1c-a944-4127-8061-98b2db303c4c\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " Dec 13 14:31:39.605235 kubelet[1936]: I1213 14:31:39.605228 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "bab07e1c-a944-4127-8061-98b2db303c4c" (UID: "bab07e1c-a944-4127-8061-98b2db303c4c"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:39.605349 kubelet[1936]: I1213 14:31:39.605268 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-cni-log-dir\") pod \"bab07e1c-a944-4127-8061-98b2db303c4c\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " Dec 13 14:31:39.605349 kubelet[1936]: I1213 14:31:39.605282 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "bab07e1c-a944-4127-8061-98b2db303c4c" (UID: "bab07e1c-a944-4127-8061-98b2db303c4c"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:39.605402 kubelet[1936]: I1213 14:31:39.605361 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-var-lib-calico\") pod \"bab07e1c-a944-4127-8061-98b2db303c4c\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " Dec 13 14:31:39.605402 kubelet[1936]: I1213 14:31:39.605379 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-lib-modules\") pod \"bab07e1c-a944-4127-8061-98b2db303c4c\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " Dec 13 14:31:39.605402 kubelet[1936]: I1213 14:31:39.605393 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-policysync\") pod \"bab07e1c-a944-4127-8061-98b2db303c4c\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " Dec 13 14:31:39.605476 kubelet[1936]: I1213 14:31:39.605405 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-cni-bin-dir\") pod \"bab07e1c-a944-4127-8061-98b2db303c4c\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " Dec 13 14:31:39.605476 kubelet[1936]: I1213 14:31:39.605421 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-wz7f2\" (UniqueName: \"kubernetes.io/projected/bab07e1c-a944-4127-8061-98b2db303c4c-kube-api-access-wz7f2\") pod \"bab07e1c-a944-4127-8061-98b2db303c4c\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " Dec 13 14:31:39.605476 kubelet[1936]: I1213 14:31:39.605433 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-policysync" (OuterVolumeSpecName: "policysync") pod "bab07e1c-a944-4127-8061-98b2db303c4c" (UID: "bab07e1c-a944-4127-8061-98b2db303c4c"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:39.605476 kubelet[1936]: I1213 14:31:39.605435 1936 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-flexvol-driver-host\") pod \"bab07e1c-a944-4127-8061-98b2db303c4c\" (UID: \"bab07e1c-a944-4127-8061-98b2db303c4c\") " Dec 13 14:31:39.605476 kubelet[1936]: I1213 14:31:39.605435 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "bab07e1c-a944-4127-8061-98b2db303c4c" (UID: "bab07e1c-a944-4127-8061-98b2db303c4c"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:39.605600 kubelet[1936]: I1213 14:31:39.605453 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "bab07e1c-a944-4127-8061-98b2db303c4c" (UID: "bab07e1c-a944-4127-8061-98b2db303c4c"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:39.605600 kubelet[1936]: I1213 14:31:39.605472 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "bab07e1c-a944-4127-8061-98b2db303c4c" (UID: "bab07e1c-a944-4127-8061-98b2db303c4c"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:39.605600 kubelet[1936]: I1213 14:31:39.605483 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "bab07e1c-a944-4127-8061-98b2db303c4c" (UID: "bab07e1c-a944-4127-8061-98b2db303c4c"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:39.605600 kubelet[1936]: I1213 14:31:39.605483 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c40609e4-9f38-4200-9a7f-3d4159361b15-tigera-ca-bundle\") pod \"calico-node-9xmdz\" (UID: \"c40609e4-9f38-4200-9a7f-3d4159361b15\") " pod="calico-system/calico-node-9xmdz" Dec 13 14:31:39.605600 kubelet[1936]: I1213 14:31:39.605529 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c40609e4-9f38-4200-9a7f-3d4159361b15-var-lib-calico\") pod \"calico-node-9xmdz\" (UID: \"c40609e4-9f38-4200-9a7f-3d4159361b15\") " pod="calico-system/calico-node-9xmdz" Dec 13 14:31:39.605745 kubelet[1936]: I1213 14:31:39.605557 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tdkm2\" (UniqueName: \"kubernetes.io/projected/c40609e4-9f38-4200-9a7f-3d4159361b15-kube-api-access-tdkm2\") pod \"calico-node-9xmdz\" (UID: \"c40609e4-9f38-4200-9a7f-3d4159361b15\") " pod="calico-system/calico-node-9xmdz" Dec 13 14:31:39.605745 kubelet[1936]: I1213 14:31:39.605659 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/c40609e4-9f38-4200-9a7f-3d4159361b15-var-run-calico\") pod \"calico-node-9xmdz\" (UID: \"c40609e4-9f38-4200-9a7f-3d4159361b15\") " pod="calico-system/calico-node-9xmdz" Dec 13 14:31:39.605745 kubelet[1936]: I1213 14:31:39.605688 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/c40609e4-9f38-4200-9a7f-3d4159361b15-cni-bin-dir\") pod \"calico-node-9xmdz\" (UID: \"c40609e4-9f38-4200-9a7f-3d4159361b15\") " pod="calico-system/calico-node-9xmdz" Dec 13 14:31:39.605745 kubelet[1936]: I1213 14:31:39.605739 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/c40609e4-9f38-4200-9a7f-3d4159361b15-policysync\") pod \"calico-node-9xmdz\" (UID: \"c40609e4-9f38-4200-9a7f-3d4159361b15\") " pod="calico-system/calico-node-9xmdz" Dec 13 14:31:39.605856 kubelet[1936]: I1213 14:31:39.605762 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/c40609e4-9f38-4200-9a7f-3d4159361b15-cni-log-dir\") pod \"calico-node-9xmdz\" (UID: \"c40609e4-9f38-4200-9a7f-3d4159361b15\") " pod="calico-system/calico-node-9xmdz" Dec 13 14:31:39.605921 kubelet[1936]: I1213 14:31:39.605900 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/c40609e4-9f38-4200-9a7f-3d4159361b15-flexvol-driver-host\") pod \"calico-node-9xmdz\" (UID: \"c40609e4-9f38-4200-9a7f-3d4159361b15\") " pod="calico-system/calico-node-9xmdz" Dec 13 14:31:39.606081 kubelet[1936]: I1213 14:31:39.606055 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c40609e4-9f38-4200-9a7f-3d4159361b15-lib-modules\") pod \"calico-node-9xmdz\" (UID: \"c40609e4-9f38-4200-9a7f-3d4159361b15\") " pod="calico-system/calico-node-9xmdz" Dec 13 14:31:39.606228 kubelet[1936]: I1213 14:31:39.606208 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c40609e4-9f38-4200-9a7f-3d4159361b15-xtables-lock\") pod \"calico-node-9xmdz\" (UID: \"c40609e4-9f38-4200-9a7f-3d4159361b15\") " pod="calico-system/calico-node-9xmdz" Dec 13 14:31:39.606393 kubelet[1936]: I1213 14:31:39.606373 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/c40609e4-9f38-4200-9a7f-3d4159361b15-node-certs\") pod \"calico-node-9xmdz\" (UID: \"c40609e4-9f38-4200-9a7f-3d4159361b15\") " pod="calico-system/calico-node-9xmdz" Dec 13 14:31:39.606569 kubelet[1936]: I1213 14:31:39.606530 1936 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/c40609e4-9f38-4200-9a7f-3d4159361b15-cni-net-dir\") pod \"calico-node-9xmdz\" (UID: \"c40609e4-9f38-4200-9a7f-3d4159361b15\") " pod="calico-system/calico-node-9xmdz" Dec 13 14:31:39.606645 kubelet[1936]: I1213 14:31:39.606581 1936 reconciler_common.go:288] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-flexvol-driver-host\") on node \"localhost\" DevicePath \"\"" Dec 13 14:31:39.606645 kubelet[1936]: I1213 14:31:39.606612 1936 reconciler_common.go:288] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-xtables-lock\") on node \"localhost\" DevicePath \"\"" Dec 13 14:31:39.606645 kubelet[1936]: I1213 14:31:39.606635 1936 reconciler_common.go:288] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-var-lib-calico\") on node \"localhost\" DevicePath \"\"" Dec 13 14:31:39.606731 kubelet[1936]: I1213 14:31:39.606647 1936 reconciler_common.go:288] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-cni-net-dir\") on node \"localhost\" DevicePath \"\"" Dec 13 14:31:39.606731 kubelet[1936]: I1213 14:31:39.606658 1936 reconciler_common.go:288] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-var-run-calico\") on node \"localhost\" DevicePath \"\"" Dec 13 14:31:39.606731 kubelet[1936]: I1213 14:31:39.606668 1936 reconciler_common.go:288] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-cni-log-dir\") on node \"localhost\" DevicePath \"\"" Dec 13 14:31:39.606731 kubelet[1936]: I1213 14:31:39.606678 1936 reconciler_common.go:288] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-lib-modules\") on node \"localhost\" DevicePath \"\"" Dec 13 14:31:39.606731 kubelet[1936]: I1213 14:31:39.606688 1936 reconciler_common.go:288] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-policysync\") on node \"localhost\" DevicePath \"\"" Dec 13 14:31:39.606731 kubelet[1936]: I1213 14:31:39.606697 1936 reconciler_common.go:288] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/bab07e1c-a944-4127-8061-98b2db303c4c-cni-bin-dir\") on node \"localhost\" DevicePath \"\"" Dec 13 14:31:39.611557 kubelet[1936]: I1213 14:31:39.609258 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/bab07e1c-a944-4127-8061-98b2db303c4c-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "bab07e1c-a944-4127-8061-98b2db303c4c" (UID: "bab07e1c-a944-4127-8061-98b2db303c4c"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 14:31:39.611557 kubelet[1936]: I1213 14:31:39.610943 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/bab07e1c-a944-4127-8061-98b2db303c4c-kube-api-access-wz7f2" (OuterVolumeSpecName: "kube-api-access-wz7f2") pod "bab07e1c-a944-4127-8061-98b2db303c4c" (UID: "bab07e1c-a944-4127-8061-98b2db303c4c"). InnerVolumeSpecName "kube-api-access-wz7f2". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 14:31:39.611557 kubelet[1936]: I1213 14:31:39.611499 1936 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/bab07e1c-a944-4127-8061-98b2db303c4c-node-certs" (OuterVolumeSpecName: "node-certs") pod "bab07e1c-a944-4127-8061-98b2db303c4c" (UID: "bab07e1c-a944-4127-8061-98b2db303c4c"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 14:31:39.609986 systemd[1]: var-lib-kubelet-pods-bab07e1c\x2da944\x2d4127\x2d8061\x2d98b2db303c4c-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dwz7f2.mount: Deactivated successfully. Dec 13 14:31:39.610067 systemd[1]: var-lib-kubelet-pods-bab07e1c\x2da944\x2d4127\x2d8061\x2d98b2db303c4c-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Dec 13 14:31:39.612265 systemd[1]: var-lib-kubelet-pods-bab07e1c\x2da944\x2d4127\x2d8061\x2d98b2db303c4c-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. Dec 13 14:31:39.627625 kubelet[1936]: I1213 14:31:39.627572 1936 scope.go:117] "RemoveContainer" containerID="20db524a80bd6100e9badbc9ccec52a5bab647f4ccb87467bcedb5597b0bc81f" Dec 13 14:31:39.628387 env[1202]: time="2024-12-13T14:31:39.628351182Z" level=info msg="RemoveContainer for \"20db524a80bd6100e9badbc9ccec52a5bab647f4ccb87467bcedb5597b0bc81f\"" Dec 13 14:31:39.630776 systemd[1]: Removed slice kubepods-besteffort-podbab07e1c_a944_4127_8061_98b2db303c4c.slice. Dec 13 14:31:39.631980 env[1202]: time="2024-12-13T14:31:39.631952056Z" level=info msg="RemoveContainer for \"20db524a80bd6100e9badbc9ccec52a5bab647f4ccb87467bcedb5597b0bc81f\" returns successfully" Dec 13 14:31:39.632132 kubelet[1936]: I1213 14:31:39.632073 1936 scope.go:117] "RemoveContainer" containerID="cda2ba2f48caa20071e4f132d9345a0649525abd474499af970cf4cf1f50a79a" Dec 13 14:31:39.633801 env[1202]: time="2024-12-13T14:31:39.633770879Z" level=info msg="RemoveContainer for \"cda2ba2f48caa20071e4f132d9345a0649525abd474499af970cf4cf1f50a79a\"" Dec 13 14:31:39.636959 env[1202]: time="2024-12-13T14:31:39.636933806Z" level=info msg="RemoveContainer for \"cda2ba2f48caa20071e4f132d9345a0649525abd474499af970cf4cf1f50a79a\" returns successfully" Dec 13 14:31:39.637089 kubelet[1936]: I1213 14:31:39.637065 1936 scope.go:117] "RemoveContainer" containerID="466eb9807613e12b5598810038feb2361fab8c96b9a87bc9f8bae1e3a9af9768" Dec 13 14:31:39.640709 env[1202]: time="2024-12-13T14:31:39.640671132Z" level=info msg="RemoveContainer for \"466eb9807613e12b5598810038feb2361fab8c96b9a87bc9f8bae1e3a9af9768\"" Dec 13 14:31:39.646097 env[1202]: time="2024-12-13T14:31:39.646059500Z" level=info msg="RemoveContainer for \"466eb9807613e12b5598810038feb2361fab8c96b9a87bc9f8bae1e3a9af9768\" returns successfully" Dec 13 14:31:39.708151 kubelet[1936]: I1213 14:31:39.708039 1936 reconciler_common.go:288] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bab07e1c-a944-4127-8061-98b2db303c4c-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" Dec 13 14:31:39.708353 kubelet[1936]: I1213 14:31:39.708313 1936 reconciler_common.go:288] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/bab07e1c-a944-4127-8061-98b2db303c4c-node-certs\") on node \"localhost\" DevicePath \"\"" Dec 13 14:31:39.708353 kubelet[1936]: I1213 14:31:39.708327 1936 reconciler_common.go:288] "Volume detached for volume \"kube-api-access-wz7f2\" (UniqueName: \"kubernetes.io/projected/bab07e1c-a944-4127-8061-98b2db303c4c-kube-api-access-wz7f2\") on node \"localhost\" DevicePath \"\"" Dec 13 14:31:39.843201 kubelet[1936]: E1213 14:31:39.843157 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:39.843734 env[1202]: time="2024-12-13T14:31:39.843680991Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-9xmdz,Uid:c40609e4-9f38-4200-9a7f-3d4159361b15,Namespace:calico-system,Attempt:0,}" Dec 13 14:31:39.856448 env[1202]: time="2024-12-13T14:31:39.856354328Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:39.856448 env[1202]: time="2024-12-13T14:31:39.856395598Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:39.856448 env[1202]: time="2024-12-13T14:31:39.856405757Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:39.856873 env[1202]: time="2024-12-13T14:31:39.856814310Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fe6140d0722907bde39629eeeac63ef63a49b925d55229e6b03d18bbf258c06c pid=3859 runtime=io.containerd.runc.v2 Dec 13 14:31:39.867167 systemd[1]: Started cri-containerd-fe6140d0722907bde39629eeeac63ef63a49b925d55229e6b03d18bbf258c06c.scope. Dec 13 14:31:39.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.876000 audit: BPF prog-id=148 op=LOAD Dec 13 14:31:39.877000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.877000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3859 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:39.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665363134306430373232393037626465333936323965656561633633 Dec 13 14:31:39.877000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.877000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3859 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:39.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665363134306430373232393037626465333936323965656561633633 Dec 13 14:31:39.877000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.877000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.877000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.877000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.877000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.877000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.877000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.877000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.877000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.877000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.877000 audit: BPF prog-id=149 op=LOAD Dec 13 14:31:39.877000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000092dd0 items=0 ppid=3859 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:39.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665363134306430373232393037626465333936323965656561633633 Dec 13 14:31:39.878000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.878000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.878000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.878000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.878000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.878000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.878000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.878000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.878000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.878000 audit: BPF prog-id=150 op=LOAD Dec 13 14:31:39.878000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000092e18 items=0 ppid=3859 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:39.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665363134306430373232393037626465333936323965656561633633 Dec 13 14:31:39.878000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:31:39.878000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:31:39.878000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.878000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.878000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.878000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.878000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.878000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.878000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.878000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.878000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.878000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.878000 audit: BPF prog-id=151 op=LOAD Dec 13 14:31:39.878000 audit[3869]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000093228 items=0 ppid=3859 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:39.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665363134306430373232393037626465333936323965656561633633 Dec 13 14:31:39.888562 env[1202]: time="2024-12-13T14:31:39.888523958Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-9xmdz,Uid:c40609e4-9f38-4200-9a7f-3d4159361b15,Namespace:calico-system,Attempt:0,} returns sandbox id \"fe6140d0722907bde39629eeeac63ef63a49b925d55229e6b03d18bbf258c06c\"" Dec 13 14:31:39.889318 kubelet[1936]: E1213 14:31:39.889281 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:39.893943 env[1202]: time="2024-12-13T14:31:39.893909200Z" level=info msg="CreateContainer within sandbox \"fe6140d0722907bde39629eeeac63ef63a49b925d55229e6b03d18bbf258c06c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:31:39.895009 kubelet[1936]: I1213 14:31:39.894135 1936 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="bab07e1c-a944-4127-8061-98b2db303c4c" path="/var/lib/kubelet/pods/bab07e1c-a944-4127-8061-98b2db303c4c/volumes" Dec 13 14:31:39.909192 env[1202]: time="2024-12-13T14:31:39.909119074Z" level=info msg="CreateContainer within sandbox \"fe6140d0722907bde39629eeeac63ef63a49b925d55229e6b03d18bbf258c06c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"f45c76a8c9d04652945b8de41e62bcc2b7976b9dfb89665a91b91de1143ac50d\"" Dec 13 14:31:39.909594 env[1202]: time="2024-12-13T14:31:39.909523799Z" level=info msg="StartContainer for \"f45c76a8c9d04652945b8de41e62bcc2b7976b9dfb89665a91b91de1143ac50d\"" Dec 13 14:31:39.923676 systemd[1]: Started cri-containerd-f45c76a8c9d04652945b8de41e62bcc2b7976b9dfb89665a91b91de1143ac50d.scope. Dec 13 14:31:39.936000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.936000 audit[3900]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f18d033cff8 items=0 ppid=3859 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:39.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634356337366138633964303436353239343562386465343165363262 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit: BPF prog-id=152 op=LOAD Dec 13 14:31:39.937000 audit[3900]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000346ca8 items=0 ppid=3859 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:39.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634356337366138633964303436353239343562386465343165363262 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit: BPF prog-id=153 op=LOAD Dec 13 14:31:39.937000 audit[3900]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000346cf8 items=0 ppid=3859 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:39.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634356337366138633964303436353239343562386465343165363262 Dec 13 14:31:39.937000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:31:39.937000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:39.937000 audit: BPF prog-id=154 op=LOAD Dec 13 14:31:39.937000 audit[3900]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000346d88 items=0 ppid=3859 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:39.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634356337366138633964303436353239343562386465343165363262 Dec 13 14:31:39.950747 env[1202]: time="2024-12-13T14:31:39.950695465Z" level=info msg="StartContainer for \"f45c76a8c9d04652945b8de41e62bcc2b7976b9dfb89665a91b91de1143ac50d\" returns successfully" Dec 13 14:31:39.981033 systemd[1]: cri-containerd-f45c76a8c9d04652945b8de41e62bcc2b7976b9dfb89665a91b91de1143ac50d.scope: Deactivated successfully. Dec 13 14:31:39.984000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:31:40.027375 env[1202]: time="2024-12-13T14:31:40.027300624Z" level=info msg="shim disconnected" id=f45c76a8c9d04652945b8de41e62bcc2b7976b9dfb89665a91b91de1143ac50d Dec 13 14:31:40.027375 env[1202]: time="2024-12-13T14:31:40.027346451Z" level=warning msg="cleaning up after shim disconnected" id=f45c76a8c9d04652945b8de41e62bcc2b7976b9dfb89665a91b91de1143ac50d namespace=k8s.io Dec 13 14:31:40.027375 env[1202]: time="2024-12-13T14:31:40.027356210Z" level=info msg="cleaning up dead shim" Dec 13 14:31:40.034184 env[1202]: time="2024-12-13T14:31:40.034129633Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:40Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3940 runtime=io.containerd.runc.v2\n" Dec 13 14:31:40.630969 kubelet[1936]: E1213 14:31:40.630929 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:40.632922 env[1202]: time="2024-12-13T14:31:40.632777241Z" level=info msg="CreateContainer within sandbox \"fe6140d0722907bde39629eeeac63ef63a49b925d55229e6b03d18bbf258c06c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:31:40.650088 env[1202]: time="2024-12-13T14:31:40.650038284Z" level=info msg="CreateContainer within sandbox \"fe6140d0722907bde39629eeeac63ef63a49b925d55229e6b03d18bbf258c06c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a26c54bc6fbbb026861dde61e611126bd4e9093882d11de6eefb8885a5f66d27\"" Dec 13 14:31:40.650510 env[1202]: time="2024-12-13T14:31:40.650490851Z" level=info msg="StartContainer for \"a26c54bc6fbbb026861dde61e611126bd4e9093882d11de6eefb8885a5f66d27\"" Dec 13 14:31:40.668797 systemd[1]: Started cri-containerd-a26c54bc6fbbb026861dde61e611126bd4e9093882d11de6eefb8885a5f66d27.scope. Dec 13 14:31:40.681000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.681000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fbd1d06f3f8 items=0 ppid=3859 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:40.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132366335346263366662626230323638363164646536316536313131 Dec 13 14:31:40.681000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.681000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.681000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.681000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.681000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.681000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.681000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.681000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.681000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.681000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.681000 audit: BPF prog-id=155 op=LOAD Dec 13 14:31:40.681000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000386a88 items=0 ppid=3859 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:40.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132366335346263366662626230323638363164646536316536313131 Dec 13 14:31:40.682000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.682000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.682000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.682000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.682000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.682000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.682000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.682000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.682000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.682000 audit: BPF prog-id=156 op=LOAD Dec 13 14:31:40.682000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000386ad8 items=0 ppid=3859 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:40.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132366335346263366662626230323638363164646536316536313131 Dec 13 14:31:40.682000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:31:40.682000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:31:40.682000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.682000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.682000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.682000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.682000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.682000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.682000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.682000 audit[3959]: AVC avc: denied { perfmon } for pid=3959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.682000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.682000 audit[3959]: AVC avc: denied { bpf } for pid=3959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:40.682000 audit: BPF prog-id=157 op=LOAD Dec 13 14:31:40.682000 audit[3959]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000386b68 items=0 ppid=3859 pid=3959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:40.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132366335346263366662626230323638363164646536316536313131 Dec 13 14:31:40.696501 env[1202]: time="2024-12-13T14:31:40.696441349Z" level=info msg="StartContainer for \"a26c54bc6fbbb026861dde61e611126bd4e9093882d11de6eefb8885a5f66d27\" returns successfully" Dec 13 14:31:41.088437 env[1202]: time="2024-12-13T14:31:41.088279902Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: failed to load CNI config list file /etc/cni/net.d/10-calico.conflist: error parsing configuration list: unexpected end of JSON input: invalid cni config: failed to load cni config" Dec 13 14:31:41.090822 systemd[1]: cri-containerd-a26c54bc6fbbb026861dde61e611126bd4e9093882d11de6eefb8885a5f66d27.scope: Deactivated successfully. Dec 13 14:31:41.095000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:31:41.097768 kernel: kauditd_printk_skb: 147 callbacks suppressed Dec 13 14:31:41.097829 kernel: audit: type=1334 audit(1734100301.095:1163): prog-id=157 op=UNLOAD Dec 13 14:31:41.107803 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a26c54bc6fbbb026861dde61e611126bd4e9093882d11de6eefb8885a5f66d27-rootfs.mount: Deactivated successfully. Dec 13 14:31:41.113268 env[1202]: time="2024-12-13T14:31:41.113221800Z" level=info msg="shim disconnected" id=a26c54bc6fbbb026861dde61e611126bd4e9093882d11de6eefb8885a5f66d27 Dec 13 14:31:41.113268 env[1202]: time="2024-12-13T14:31:41.113266205Z" level=warning msg="cleaning up after shim disconnected" id=a26c54bc6fbbb026861dde61e611126bd4e9093882d11de6eefb8885a5f66d27 namespace=k8s.io Dec 13 14:31:41.113381 env[1202]: time="2024-12-13T14:31:41.113275192Z" level=info msg="cleaning up dead shim" Dec 13 14:31:41.123192 env[1202]: time="2024-12-13T14:31:41.123134441Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4005 runtime=io.containerd.runc.v2\n" Dec 13 14:31:41.177010 systemd[1]: Started sshd@18-10.0.0.133:22-10.0.0.1:48708.service. Dec 13 14:31:41.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.133:22-10.0.0.1:48708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:41.181873 kernel: audit: type=1130 audit(1734100301.176:1164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.133:22-10.0.0.1:48708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:41.216000 audit[4018]: USER_ACCT pid=4018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:41.217340 sshd[4018]: Accepted publickey for core from 10.0.0.1 port 48708 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:31:41.220000 audit[4018]: CRED_ACQ pid=4018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:41.221457 sshd[4018]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:41.224674 kernel: audit: type=1101 audit(1734100301.216:1165): pid=4018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:41.224783 kernel: audit: type=1103 audit(1734100301.220:1166): pid=4018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:41.224813 kernel: audit: type=1006 audit(1734100301.220:1167): pid=4018 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Dec 13 14:31:41.225425 systemd-logind[1194]: New session 19 of user core. Dec 13 14:31:41.226210 systemd[1]: Started session-19.scope. Dec 13 14:31:41.220000 audit[4018]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff00763380 a2=3 a3=0 items=0 ppid=1 pid=4018 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:41.231489 kernel: audit: type=1300 audit(1734100301.220:1167): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff00763380 a2=3 a3=0 items=0 ppid=1 pid=4018 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:41.231543 kernel: audit: type=1327 audit(1734100301.220:1167): proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:41.220000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:41.237000 audit[4018]: USER_START pid=4018 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:41.238000 audit[4020]: CRED_ACQ pid=4020 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:41.246726 kernel: audit: type=1105 audit(1734100301.237:1168): pid=4018 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:41.246900 kernel: audit: type=1103 audit(1734100301.238:1169): pid=4020 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:41.345610 sshd[4018]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:41.346000 audit[4018]: USER_END pid=4018 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:41.348805 systemd[1]: sshd@18-10.0.0.133:22-10.0.0.1:48708.service: Deactivated successfully. Dec 13 14:31:41.349710 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:31:41.351003 systemd-logind[1194]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:31:41.352202 systemd-logind[1194]: Removed session 19. Dec 13 14:31:41.346000 audit[4018]: CRED_DISP pid=4018 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:41.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.133:22-10.0.0.1:48708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:41.353876 kernel: audit: type=1106 audit(1734100301.346:1170): pid=4018 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:41.636165 kubelet[1936]: E1213 14:31:41.636127 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:41.657798 env[1202]: time="2024-12-13T14:31:41.657754438Z" level=info msg="CreateContainer within sandbox \"fe6140d0722907bde39629eeeac63ef63a49b925d55229e6b03d18bbf258c06c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:31:41.670812 env[1202]: time="2024-12-13T14:31:41.670754624Z" level=info msg="CreateContainer within sandbox \"fe6140d0722907bde39629eeeac63ef63a49b925d55229e6b03d18bbf258c06c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"a3ed4d84829e8464bd1469cf49c3095a8d8c77f514ce9fafb2e1b8234dd97b1e\"" Dec 13 14:31:41.671347 env[1202]: time="2024-12-13T14:31:41.671305058Z" level=info msg="StartContainer for \"a3ed4d84829e8464bd1469cf49c3095a8d8c77f514ce9fafb2e1b8234dd97b1e\"" Dec 13 14:31:41.687332 systemd[1]: Started cri-containerd-a3ed4d84829e8464bd1469cf49c3095a8d8c77f514ce9fafb2e1b8234dd97b1e.scope. Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fabe5322018 items=0 ppid=3859 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:41.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656434643834383239653834363462643134363963663439633330 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit: BPF prog-id=158 op=LOAD Dec 13 14:31:41.705000 audit[4039]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001faa78 items=0 ppid=3859 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:41.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656434643834383239653834363462643134363963663439633330 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit: BPF prog-id=159 op=LOAD Dec 13 14:31:41.705000 audit[4039]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001faac8 items=0 ppid=3859 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:41.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656434643834383239653834363462643134363963663439633330 Dec 13 14:31:41.705000 audit: BPF prog-id=159 op=UNLOAD Dec 13 14:31:41.705000 audit: BPF prog-id=158 op=UNLOAD Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { perfmon } for pid=4039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit[4039]: AVC avc: denied { bpf } for pid=4039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:41.705000 audit: BPF prog-id=160 op=LOAD Dec 13 14:31:41.705000 audit[4039]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fab58 items=0 ppid=3859 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:41.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133656434643834383239653834363462643134363963663439633330 Dec 13 14:31:41.771440 env[1202]: time="2024-12-13T14:31:41.771373044Z" level=info msg="StartContainer for \"a3ed4d84829e8464bd1469cf49c3095a8d8c77f514ce9fafb2e1b8234dd97b1e\" returns successfully" Dec 13 14:31:42.640130 kubelet[1936]: E1213 14:31:42.640080 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:42.891456 kubelet[1936]: E1213 14:31:42.891328 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:43.162000 audit[4172]: AVC avc: denied { write } for pid=4172 comm="tee" name="fd" dev="proc" ino=26354 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:43.162000 audit[4172]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf74fea17 a2=241 a3=1b6 items=1 ppid=4134 pid=4172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.162000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:31:43.162000 audit: PATH item=0 name="/dev/fd/63" inode=26351 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:43.162000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:43.164000 audit[4164]: AVC avc: denied { write } for pid=4164 comm="tee" name="fd" dev="proc" ino=27871 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:43.164000 audit[4164]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec5d8ea26 a2=241 a3=1b6 items=1 ppid=4124 pid=4164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.164000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:31:43.164000 audit: PATH item=0 name="/dev/fd/63" inode=25485 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:43.164000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:43.166000 audit[4174]: AVC avc: denied { write } for pid=4174 comm="tee" name="fd" dev="proc" ino=26363 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:43.166000 audit[4174]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3dc3aa28 a2=241 a3=1b6 items=1 ppid=4129 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.166000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:31:43.166000 audit: PATH item=0 name="/dev/fd/63" inode=25489 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:43.166000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:43.168000 audit[4168]: AVC avc: denied { write } for pid=4168 comm="tee" name="fd" dev="proc" ino=26367 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:43.168000 audit[4168]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb2f11a16 a2=241 a3=1b6 items=1 ppid=4128 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.168000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:31:43.168000 audit: PATH item=0 name="/dev/fd/63" inode=27223 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:43.168000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:43.188000 audit[4178]: AVC avc: denied { write } for pid=4178 comm="tee" name="fd" dev="proc" ino=26372 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:43.188000 audit[4178]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb68eda26 a2=241 a3=1b6 items=1 ppid=4139 pid=4178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.188000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:31:43.188000 audit: PATH item=0 name="/dev/fd/63" inode=26356 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:43.188000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:43.203000 audit[4204]: AVC avc: denied { write } for pid=4204 comm="tee" name="fd" dev="proc" ino=25497 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:43.203000 audit[4204]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe99cefa26 a2=241 a3=1b6 items=1 ppid=4136 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.203000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:31:43.203000 audit: PATH item=0 name="/dev/fd/63" inode=27238 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:43.203000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:43.219000 audit[4202]: AVC avc: denied { write } for pid=4202 comm="tee" name="fd" dev="proc" ino=25501 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:43.219000 audit[4202]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3ca4fa27 a2=241 a3=1b6 items=1 ppid=4126 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.219000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:31:43.219000 audit: PATH item=0 name="/dev/fd/63" inode=27876 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:43.219000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:43.299000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.299000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.299000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.299000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.299000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.299000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.299000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.299000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.299000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.299000 audit: BPF prog-id=161 op=LOAD Dec 13 14:31:43.299000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd2eee0a0 a2=98 a3=3 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.299000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.299000 audit: BPF prog-id=161 op=UNLOAD Dec 13 14:31:43.299000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.299000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.299000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.299000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.299000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.299000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.299000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.299000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.299000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.299000 audit: BPF prog-id=162 op=LOAD Dec 13 14:31:43.299000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffd2eede80 a2=74 a3=540051 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.299000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.300000 audit: BPF prog-id=162 op=UNLOAD Dec 13 14:31:43.300000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.300000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.300000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.300000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.300000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.300000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.300000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.300000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.300000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.300000 audit: BPF prog-id=163 op=LOAD Dec 13 14:31:43.300000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffd2eedeb0 a2=94 a3=2 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.300000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.300000 audit: BPF prog-id=163 op=UNLOAD Dec 13 14:31:43.406000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.406000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.406000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.406000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.406000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.406000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.406000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.406000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.406000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.406000 audit: BPF prog-id=164 op=LOAD Dec 13 14:31:43.406000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffd2eedd70 a2=40 a3=1 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.406000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.406000 audit: BPF prog-id=164 op=UNLOAD Dec 13 14:31:43.406000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.406000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffd2eede40 a2=50 a3=7fffd2eedf20 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.406000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.413000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.413000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd2eedd80 a2=28 a3=0 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.413000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd2eeddb0 a2=28 a3=0 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd2eedcc0 a2=28 a3=0 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd2eeddd0 a2=28 a3=0 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd2eeddb0 a2=28 a3=0 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd2eedda0 a2=28 a3=0 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd2eeddd0 a2=28 a3=0 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd2eeddb0 a2=28 a3=0 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd2eeddd0 a2=28 a3=0 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd2eedda0 a2=28 a3=0 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd2eede10 a2=28 a3=0 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffd2eedbc0 a2=50 a3=1 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit: BPF prog-id=165 op=LOAD Dec 13 14:31:43.414000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd2eedbc0 a2=94 a3=5 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.414000 audit: BPF prog-id=165 op=UNLOAD Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffd2eedc70 a2=50 a3=1 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffd2eedd90 a2=4 a3=38 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { confidentiality } for pid=4241 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:43.414000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffd2eedde0 a2=94 a3=6 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.414000 audit[4241]: AVC avc: denied { confidentiality } for pid=4241 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:43.414000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffd2eed590 a2=94 a3=83 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.415000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.415000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.415000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.415000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.415000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.415000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.415000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.415000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.415000 audit[4241]: AVC avc: denied { perfmon } for pid=4241 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.415000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.415000 audit[4241]: AVC avc: denied { confidentiality } for pid=4241 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:43.415000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffd2eed590 a2=94 a3=83 items=0 ppid=4125 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.415000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit: BPF prog-id=166 op=LOAD Dec 13 14:31:43.422000 audit[4244]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffedcdee9e0 a2=98 a3=1999999999999999 items=0 ppid=4125 pid=4244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.422000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:31:43.422000 audit: BPF prog-id=166 op=UNLOAD Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit: BPF prog-id=167 op=LOAD Dec 13 14:31:43.422000 audit[4244]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffedcdee8c0 a2=74 a3=ffff items=0 ppid=4125 pid=4244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.422000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:31:43.422000 audit: BPF prog-id=167 op=UNLOAD Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { perfmon } for pid=4244 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit[4244]: AVC avc: denied { bpf } for pid=4244 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.422000 audit: BPF prog-id=168 op=LOAD Dec 13 14:31:43.422000 audit[4244]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffedcdee900 a2=40 a3=7ffedcdeeae0 items=0 ppid=4125 pid=4244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.422000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:31:43.422000 audit: BPF prog-id=168 op=UNLOAD Dec 13 14:31:43.467184 systemd-networkd[1025]: vxlan.calico: Link UP Dec 13 14:31:43.467193 systemd-networkd[1025]: vxlan.calico: Gained carrier Dec 13 14:31:43.484000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.484000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.484000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.484000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.484000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.484000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.484000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.484000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.484000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.484000 audit: BPF prog-id=169 op=LOAD Dec 13 14:31:43.484000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff6c45d3d0 a2=98 a3=ffffffff items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.484000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.484000 audit: BPF prog-id=169 op=UNLOAD Dec 13 14:31:43.484000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.484000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.484000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.484000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.484000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.484000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.484000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.484000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.484000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.484000 audit: BPF prog-id=170 op=LOAD Dec 13 14:31:43.484000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff6c45d1e0 a2=74 a3=540051 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.484000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.485000 audit: BPF prog-id=170 op=UNLOAD Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit: BPF prog-id=171 op=LOAD Dec 13 14:31:43.485000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff6c45d210 a2=94 a3=2 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.485000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.485000 audit: BPF prog-id=171 op=UNLOAD Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff6c45d0e0 a2=28 a3=0 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.485000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6c45d110 a2=28 a3=0 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.485000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6c45d020 a2=28 a3=0 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.485000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff6c45d130 a2=28 a3=0 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.485000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff6c45d110 a2=28 a3=0 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.485000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff6c45d100 a2=28 a3=0 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.485000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff6c45d130 a2=28 a3=0 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.485000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6c45d110 a2=28 a3=0 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.485000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6c45d130 a2=28 a3=0 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.485000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff6c45d100 a2=28 a3=0 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.485000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff6c45d170 a2=28 a3=0 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.485000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.485000 audit: BPF prog-id=172 op=LOAD Dec 13 14:31:43.485000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff6c45cfe0 a2=40 a3=0 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.485000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.485000 audit: BPF prog-id=172 op=UNLOAD Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff6c45cfd0 a2=50 a3=2800 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.486000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff6c45cfd0 a2=50 a3=2800 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.486000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit: BPF prog-id=173 op=LOAD Dec 13 14:31:43.486000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff6c45c7f0 a2=94 a3=2 items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.486000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.486000 audit: BPF prog-id=173 op=UNLOAD Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.486000 audit: BPF prog-id=174 op=LOAD Dec 13 14:31:43.486000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff6c45c8f0 a2=94 a3=2d items=0 ppid=4125 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.486000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:43.493000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.493000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.493000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.493000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.493000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.493000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.493000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.493000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.493000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.493000 audit: BPF prog-id=175 op=LOAD Dec 13 14:31:43.493000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe4ceb0c80 a2=98 a3=0 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.493000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.493000 audit: BPF prog-id=175 op=UNLOAD Dec 13 14:31:43.493000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.493000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.493000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.493000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.493000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.493000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.493000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.493000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.493000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.493000 audit: BPF prog-id=176 op=LOAD Dec 13 14:31:43.493000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe4ceb0a60 a2=74 a3=540051 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.493000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.494000 audit: BPF prog-id=176 op=UNLOAD Dec 13 14:31:43.494000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.494000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.494000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.494000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.494000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.494000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.494000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.494000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.494000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.494000 audit: BPF prog-id=177 op=LOAD Dec 13 14:31:43.494000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe4ceb0a90 a2=94 a3=2 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.494000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.494000 audit: BPF prog-id=177 op=UNLOAD Dec 13 14:31:43.602000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.602000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.602000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.602000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.602000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.602000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.602000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.602000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.602000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.602000 audit: BPF prog-id=178 op=LOAD Dec 13 14:31:43.602000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe4ceb0950 a2=40 a3=1 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.602000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.603000 audit: BPF prog-id=178 op=UNLOAD Dec 13 14:31:43.603000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.603000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe4ceb0a20 a2=50 a3=7ffe4ceb0b00 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.603000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4ceb0960 a2=28 a3=0 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.611000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4ceb0990 a2=28 a3=0 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.611000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4ceb08a0 a2=28 a3=0 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.611000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4ceb09b0 a2=28 a3=0 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.611000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4ceb0990 a2=28 a3=0 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.611000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4ceb0980 a2=28 a3=0 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.611000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4ceb09b0 a2=28 a3=0 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.611000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4ceb0990 a2=28 a3=0 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.611000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4ceb09b0 a2=28 a3=0 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.611000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe4ceb0980 a2=28 a3=0 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.611000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe4ceb09f0 a2=28 a3=0 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.611000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe4ceb07a0 a2=50 a3=1 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.611000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.611000 audit: BPF prog-id=179 op=LOAD Dec 13 14:31:43.611000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe4ceb07a0 a2=94 a3=5 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.611000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.612000 audit: BPF prog-id=179 op=UNLOAD Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe4ceb0850 a2=50 a3=1 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.612000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe4ceb0970 a2=4 a3=38 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.612000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { confidentiality } for pid=4277 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:43.612000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe4ceb09c0 a2=94 a3=6 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.612000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { confidentiality } for pid=4277 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:43.612000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe4ceb0170 a2=94 a3=83 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.612000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { perfmon } for pid=4277 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.612000 audit[4277]: AVC avc: denied { confidentiality } for pid=4277 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:43.612000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe4ceb0170 a2=94 a3=83 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.612000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.613000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.613000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4ceb1bb0 a2=10 a3=208 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.613000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.613000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.613000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4ceb1a50 a2=10 a3=3 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.613000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.613000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.613000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4ceb19f0 a2=10 a3=3 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.613000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.613000 audit[4277]: AVC avc: denied { bpf } for pid=4277 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:43.613000 audit[4277]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe4ceb19f0 a2=10 a3=7 items=0 ppid=4125 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.613000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:43.621000 audit: BPF prog-id=174 op=UNLOAD Dec 13 14:31:43.642610 kubelet[1936]: E1213 14:31:43.642321 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:43.658321 systemd[1]: run-containerd-runc-k8s.io-a3ed4d84829e8464bd1469cf49c3095a8d8c77f514ce9fafb2e1b8234dd97b1e-runc.mBq2Ex.mount: Deactivated successfully. Dec 13 14:31:43.673000 audit[4320]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=4320 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:43.673000 audit[4320]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd628bbb00 a2=0 a3=7ffd628bbaec items=0 ppid=4125 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.673000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:43.677000 audit[4317]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=4317 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:43.677000 audit[4317]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff457fcd90 a2=0 a3=7fff457fcd7c items=0 ppid=4125 pid=4317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.677000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:43.690000 audit[4319]: NETFILTER_CFG table=raw:99 family=2 entries=21 op=nft_register_chain pid=4319 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:43.690000 audit[4319]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff7385f0b0 a2=0 a3=7fff7385f09c items=0 ppid=4125 pid=4319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.690000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:43.692000 audit[4331]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=4331 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:43.692000 audit[4331]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc5529b010 a2=0 a3=7ffc5529affc items=0 ppid=4125 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:43.692000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:44.828060 systemd-networkd[1025]: vxlan.calico: Gained IPv6LL Dec 13 14:31:44.891735 env[1202]: time="2024-12-13T14:31:44.891675894Z" level=info msg="StopPodSandbox for \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\"" Dec 13 14:31:44.892296 env[1202]: time="2024-12-13T14:31:44.891725960Z" level=info msg="StopPodSandbox for \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\"" Dec 13 14:31:44.992553 kubelet[1936]: I1213 14:31:44.992483 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-9xmdz" podStartSLOduration=5.992460621 podStartE2EDuration="5.992460621s" podCreationTimestamp="2024-12-13 14:31:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:31:42.864518532 +0000 UTC m=+81.058306075" watchObservedRunningTime="2024-12-13 14:31:44.992460621 +0000 UTC m=+83.186248164" Dec 13 14:31:45.033688 env[1202]: 2024-12-13 14:31:44.991 [INFO][4370] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Dec 13 14:31:45.033688 env[1202]: 2024-12-13 14:31:44.994 [INFO][4370] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" iface="eth0" netns="/var/run/netns/cni-c6da58a1-dd41-c6fc-1c60-e37f1d86a20c" Dec 13 14:31:45.033688 env[1202]: 2024-12-13 14:31:44.994 [INFO][4370] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" iface="eth0" netns="/var/run/netns/cni-c6da58a1-dd41-c6fc-1c60-e37f1d86a20c" Dec 13 14:31:45.033688 env[1202]: 2024-12-13 14:31:44.994 [INFO][4370] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" iface="eth0" netns="/var/run/netns/cni-c6da58a1-dd41-c6fc-1c60-e37f1d86a20c" Dec 13 14:31:45.033688 env[1202]: 2024-12-13 14:31:44.994 [INFO][4370] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Dec 13 14:31:45.033688 env[1202]: 2024-12-13 14:31:44.994 [INFO][4370] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Dec 13 14:31:45.033688 env[1202]: 2024-12-13 14:31:45.021 [INFO][4384] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" HandleID="k8s-pod-network.1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Workload="localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0" Dec 13 14:31:45.033688 env[1202]: 2024-12-13 14:31:45.022 [INFO][4384] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:45.033688 env[1202]: 2024-12-13 14:31:45.022 [INFO][4384] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:45.033688 env[1202]: 2024-12-13 14:31:45.028 [WARNING][4384] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" HandleID="k8s-pod-network.1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Workload="localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0" Dec 13 14:31:45.033688 env[1202]: 2024-12-13 14:31:45.028 [INFO][4384] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" HandleID="k8s-pod-network.1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Workload="localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0" Dec 13 14:31:45.033688 env[1202]: 2024-12-13 14:31:45.029 [INFO][4384] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:45.033688 env[1202]: 2024-12-13 14:31:45.031 [INFO][4370] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Dec 13 14:31:45.036144 systemd[1]: run-netns-cni\x2dc6da58a1\x2ddd41\x2dc6fc\x2d1c60\x2de37f1d86a20c.mount: Deactivated successfully. Dec 13 14:31:45.038307 env[1202]: time="2024-12-13T14:31:45.038261874Z" level=info msg="TearDown network for sandbox \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\" successfully" Dec 13 14:31:45.038307 env[1202]: time="2024-12-13T14:31:45.038302501Z" level=info msg="StopPodSandbox for \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\" returns successfully" Dec 13 14:31:45.038656 kubelet[1936]: E1213 14:31:45.038624 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:45.039224 env[1202]: time="2024-12-13T14:31:45.039186579Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-wrcpk,Uid:f0a57d84-e132-4284-94a6-b96e0303f6d5,Namespace:kube-system,Attempt:1,}" Dec 13 14:31:45.040637 env[1202]: 2024-12-13 14:31:44.994 [INFO][4369] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Dec 13 14:31:45.040637 env[1202]: 2024-12-13 14:31:44.994 [INFO][4369] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" iface="eth0" netns="/var/run/netns/cni-0e043141-60c3-185b-7b1f-64a61985d039" Dec 13 14:31:45.040637 env[1202]: 2024-12-13 14:31:44.994 [INFO][4369] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" iface="eth0" netns="/var/run/netns/cni-0e043141-60c3-185b-7b1f-64a61985d039" Dec 13 14:31:45.040637 env[1202]: 2024-12-13 14:31:44.994 [INFO][4369] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" iface="eth0" netns="/var/run/netns/cni-0e043141-60c3-185b-7b1f-64a61985d039" Dec 13 14:31:45.040637 env[1202]: 2024-12-13 14:31:44.994 [INFO][4369] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Dec 13 14:31:45.040637 env[1202]: 2024-12-13 14:31:44.994 [INFO][4369] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Dec 13 14:31:45.040637 env[1202]: 2024-12-13 14:31:45.022 [INFO][4383] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" HandleID="k8s-pod-network.741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Workload="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0" Dec 13 14:31:45.040637 env[1202]: 2024-12-13 14:31:45.022 [INFO][4383] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:45.040637 env[1202]: 2024-12-13 14:31:45.030 [INFO][4383] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:45.040637 env[1202]: 2024-12-13 14:31:45.034 [WARNING][4383] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" HandleID="k8s-pod-network.741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Workload="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0" Dec 13 14:31:45.040637 env[1202]: 2024-12-13 14:31:45.034 [INFO][4383] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" HandleID="k8s-pod-network.741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Workload="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0" Dec 13 14:31:45.040637 env[1202]: 2024-12-13 14:31:45.035 [INFO][4383] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:45.040637 env[1202]: 2024-12-13 14:31:45.038 [INFO][4369] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Dec 13 14:31:45.041278 env[1202]: time="2024-12-13T14:31:45.040811131Z" level=info msg="TearDown network for sandbox \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\" successfully" Dec 13 14:31:45.041278 env[1202]: time="2024-12-13T14:31:45.040859021Z" level=info msg="StopPodSandbox for \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\" returns successfully" Dec 13 14:31:45.041432 env[1202]: time="2024-12-13T14:31:45.041408180Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65c546cf68-5bqp7,Uid:ecb2651e-9af3-4fc2-95b6-4b69df48c1c1,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:31:45.044799 systemd[1]: run-netns-cni\x2d0e043141\x2d60c3\x2d185b\x2d7b1f\x2d64a61985d039.mount: Deactivated successfully. Dec 13 14:31:45.582889 systemd-networkd[1025]: calib036bfdb5cd: Link UP Dec 13 14:31:45.588337 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:31:45.588466 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib036bfdb5cd: link becomes ready Dec 13 14:31:45.589030 systemd-networkd[1025]: calib036bfdb5cd: Gained carrier Dec 13 14:31:45.630932 env[1202]: 2024-12-13 14:31:45.108 [INFO][4398] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0 calico-apiserver-65c546cf68- calico-apiserver ecb2651e-9af3-4fc2-95b6-4b69df48c1c1 1089 0 2024-12-13 14:30:39 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:65c546cf68 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-65c546cf68-5bqp7 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calib036bfdb5cd [] []}} ContainerID="90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa" Namespace="calico-apiserver" Pod="calico-apiserver-65c546cf68-5bqp7" WorkloadEndpoint="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-" Dec 13 14:31:45.630932 env[1202]: 2024-12-13 14:31:45.109 [INFO][4398] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa" Namespace="calico-apiserver" Pod="calico-apiserver-65c546cf68-5bqp7" WorkloadEndpoint="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0" Dec 13 14:31:45.630932 env[1202]: 2024-12-13 14:31:45.137 [INFO][4426] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa" HandleID="k8s-pod-network.90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa" Workload="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0" Dec 13 14:31:45.630932 env[1202]: 2024-12-13 14:31:45.145 [INFO][4426] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa" HandleID="k8s-pod-network.90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa" Workload="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dd1e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-65c546cf68-5bqp7", "timestamp":"2024-12-13 14:31:45.137868271 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:31:45.630932 env[1202]: 2024-12-13 14:31:45.146 [INFO][4426] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:45.630932 env[1202]: 2024-12-13 14:31:45.146 [INFO][4426] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:45.630932 env[1202]: 2024-12-13 14:31:45.146 [INFO][4426] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:31:45.630932 env[1202]: 2024-12-13 14:31:45.148 [INFO][4426] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa" host="localhost" Dec 13 14:31:45.630932 env[1202]: 2024-12-13 14:31:45.152 [INFO][4426] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:31:45.630932 env[1202]: 2024-12-13 14:31:45.156 [INFO][4426] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:31:45.630932 env[1202]: 2024-12-13 14:31:45.157 [INFO][4426] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:31:45.630932 env[1202]: 2024-12-13 14:31:45.159 [INFO][4426] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:31:45.630932 env[1202]: 2024-12-13 14:31:45.159 [INFO][4426] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa" host="localhost" Dec 13 14:31:45.630932 env[1202]: 2024-12-13 14:31:45.160 [INFO][4426] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa Dec 13 14:31:45.630932 env[1202]: 2024-12-13 14:31:45.173 [INFO][4426] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa" host="localhost" Dec 13 14:31:45.630932 env[1202]: 2024-12-13 14:31:45.574 [INFO][4426] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa" host="localhost" Dec 13 14:31:45.630932 env[1202]: 2024-12-13 14:31:45.574 [INFO][4426] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa" host="localhost" Dec 13 14:31:45.630932 env[1202]: 2024-12-13 14:31:45.574 [INFO][4426] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:45.630932 env[1202]: 2024-12-13 14:31:45.574 [INFO][4426] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa" HandleID="k8s-pod-network.90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa" Workload="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0" Dec 13 14:31:45.631573 env[1202]: 2024-12-13 14:31:45.576 [INFO][4398] cni-plugin/k8s.go 386: Populated endpoint ContainerID="90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa" Namespace="calico-apiserver" Pod="calico-apiserver-65c546cf68-5bqp7" WorkloadEndpoint="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0", GenerateName:"calico-apiserver-65c546cf68-", Namespace:"calico-apiserver", SelfLink:"", UID:"ecb2651e-9af3-4fc2-95b6-4b69df48c1c1", ResourceVersion:"1089", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65c546cf68", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-65c546cf68-5bqp7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib036bfdb5cd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:45.631573 env[1202]: 2024-12-13 14:31:45.576 [INFO][4398] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa" Namespace="calico-apiserver" Pod="calico-apiserver-65c546cf68-5bqp7" WorkloadEndpoint="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0" Dec 13 14:31:45.631573 env[1202]: 2024-12-13 14:31:45.576 [INFO][4398] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib036bfdb5cd ContainerID="90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa" Namespace="calico-apiserver" Pod="calico-apiserver-65c546cf68-5bqp7" WorkloadEndpoint="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0" Dec 13 14:31:45.631573 env[1202]: 2024-12-13 14:31:45.588 [INFO][4398] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa" Namespace="calico-apiserver" Pod="calico-apiserver-65c546cf68-5bqp7" WorkloadEndpoint="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0" Dec 13 14:31:45.631573 env[1202]: 2024-12-13 14:31:45.589 [INFO][4398] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa" Namespace="calico-apiserver" Pod="calico-apiserver-65c546cf68-5bqp7" WorkloadEndpoint="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0", GenerateName:"calico-apiserver-65c546cf68-", Namespace:"calico-apiserver", SelfLink:"", UID:"ecb2651e-9af3-4fc2-95b6-4b69df48c1c1", ResourceVersion:"1089", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65c546cf68", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa", Pod:"calico-apiserver-65c546cf68-5bqp7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib036bfdb5cd", MAC:"2a:d9:c2:ca:66:a3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:45.631573 env[1202]: 2024-12-13 14:31:45.624 [INFO][4398] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa" Namespace="calico-apiserver" Pod="calico-apiserver-65c546cf68-5bqp7" WorkloadEndpoint="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0" Dec 13 14:31:45.636000 audit[4457]: NETFILTER_CFG table=filter:101 family=2 entries=40 op=nft_register_chain pid=4457 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:45.636000 audit[4457]: SYSCALL arch=c000003e syscall=46 success=yes exit=23492 a0=3 a1=7ffed2b1a6a0 a2=0 a3=7ffed2b1a68c items=0 ppid=4125 pid=4457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:45.636000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:45.644136 env[1202]: time="2024-12-13T14:31:45.643523872Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:45.644136 env[1202]: time="2024-12-13T14:31:45.643612301Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:45.644136 env[1202]: time="2024-12-13T14:31:45.643627540Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:45.644136 env[1202]: time="2024-12-13T14:31:45.643817311Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa pid=4465 runtime=io.containerd.runc.v2 Dec 13 14:31:45.651638 systemd-networkd[1025]: cali5e32d82cbae: Link UP Dec 13 14:31:45.652081 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5e32d82cbae: link becomes ready Dec 13 14:31:45.651902 systemd-networkd[1025]: cali5e32d82cbae: Gained carrier Dec 13 14:31:45.658982 systemd[1]: Started cri-containerd-90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa.scope. Dec 13 14:31:45.667947 env[1202]: 2024-12-13 14:31:45.119 [INFO][4401] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0 coredns-6f6b679f8f- kube-system f0a57d84-e132-4284-94a6-b96e0303f6d5 1088 0 2024-12-13 14:30:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-wrcpk eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali5e32d82cbae [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d" Namespace="kube-system" Pod="coredns-6f6b679f8f-wrcpk" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--wrcpk-" Dec 13 14:31:45.667947 env[1202]: 2024-12-13 14:31:45.120 [INFO][4401] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d" Namespace="kube-system" Pod="coredns-6f6b679f8f-wrcpk" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0" Dec 13 14:31:45.667947 env[1202]: 2024-12-13 14:31:45.147 [INFO][4433] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d" HandleID="k8s-pod-network.1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d" Workload="localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0" Dec 13 14:31:45.667947 env[1202]: 2024-12-13 14:31:45.154 [INFO][4433] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d" HandleID="k8s-pod-network.1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d" Workload="localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d5e0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-wrcpk", "timestamp":"2024-12-13 14:31:45.147614126 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:31:45.667947 env[1202]: 2024-12-13 14:31:45.154 [INFO][4433] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:45.667947 env[1202]: 2024-12-13 14:31:45.574 [INFO][4433] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:45.667947 env[1202]: 2024-12-13 14:31:45.574 [INFO][4433] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:31:45.667947 env[1202]: 2024-12-13 14:31:45.577 [INFO][4433] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d" host="localhost" Dec 13 14:31:45.667947 env[1202]: 2024-12-13 14:31:45.589 [INFO][4433] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:31:45.667947 env[1202]: 2024-12-13 14:31:45.593 [INFO][4433] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:31:45.667947 env[1202]: 2024-12-13 14:31:45.623 [INFO][4433] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:31:45.667947 env[1202]: 2024-12-13 14:31:45.631 [INFO][4433] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:31:45.667947 env[1202]: 2024-12-13 14:31:45.631 [INFO][4433] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d" host="localhost" Dec 13 14:31:45.667947 env[1202]: 2024-12-13 14:31:45.633 [INFO][4433] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d Dec 13 14:31:45.667947 env[1202]: 2024-12-13 14:31:45.639 [INFO][4433] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d" host="localhost" Dec 13 14:31:45.667947 env[1202]: 2024-12-13 14:31:45.644 [INFO][4433] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d" host="localhost" Dec 13 14:31:45.667947 env[1202]: 2024-12-13 14:31:45.644 [INFO][4433] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d" host="localhost" Dec 13 14:31:45.667947 env[1202]: 2024-12-13 14:31:45.644 [INFO][4433] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:45.667947 env[1202]: 2024-12-13 14:31:45.644 [INFO][4433] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d" HandleID="k8s-pod-network.1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d" Workload="localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0" Dec 13 14:31:45.668592 env[1202]: 2024-12-13 14:31:45.647 [INFO][4401] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d" Namespace="kube-system" Pod="coredns-6f6b679f8f-wrcpk" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f0a57d84-e132-4284-94a6-b96e0303f6d5", ResourceVersion:"1088", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-wrcpk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5e32d82cbae", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:45.668592 env[1202]: 2024-12-13 14:31:45.648 [INFO][4401] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d" Namespace="kube-system" Pod="coredns-6f6b679f8f-wrcpk" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0" Dec 13 14:31:45.668592 env[1202]: 2024-12-13 14:31:45.648 [INFO][4401] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5e32d82cbae ContainerID="1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d" Namespace="kube-system" Pod="coredns-6f6b679f8f-wrcpk" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0" Dec 13 14:31:45.668592 env[1202]: 2024-12-13 14:31:45.651 [INFO][4401] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d" Namespace="kube-system" Pod="coredns-6f6b679f8f-wrcpk" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0" Dec 13 14:31:45.668592 env[1202]: 2024-12-13 14:31:45.652 [INFO][4401] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d" Namespace="kube-system" Pod="coredns-6f6b679f8f-wrcpk" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f0a57d84-e132-4284-94a6-b96e0303f6d5", ResourceVersion:"1088", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d", Pod:"coredns-6f6b679f8f-wrcpk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5e32d82cbae", MAC:"2a:fb:87:ba:bb:77", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:45.668592 env[1202]: 2024-12-13 14:31:45.663 [INFO][4401] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d" Namespace="kube-system" Pod="coredns-6f6b679f8f-wrcpk" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0" Dec 13 14:31:45.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.670000 audit: BPF prog-id=180 op=LOAD Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4465 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:45.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930636639366537643763326436313762613838346230376564333730 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4465 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:45.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930636639366537643763326436313762613838346230376564333730 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit: BPF prog-id=181 op=LOAD Dec 13 14:31:45.671000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c87c0 items=0 ppid=4465 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:45.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930636639366537643763326436313762613838346230376564333730 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit: BPF prog-id=182 op=LOAD Dec 13 14:31:45.671000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c8808 items=0 ppid=4465 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:45.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930636639366537643763326436313762613838346230376564333730 Dec 13 14:31:45.671000 audit: BPF prog-id=182 op=UNLOAD Dec 13 14:31:45.671000 audit: BPF prog-id=181 op=UNLOAD Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { perfmon } for pid=4474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit[4474]: AVC avc: denied { bpf } for pid=4474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.671000 audit: BPF prog-id=183 op=LOAD Dec 13 14:31:45.671000 audit[4474]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c8c18 items=0 ppid=4465 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:45.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930636639366537643763326436313762613838346230376564333730 Dec 13 14:31:45.674259 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:31:45.673000 audit[4500]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=4500 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:45.673000 audit[4500]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fff9544a080 a2=0 a3=7fff9544a06c items=0 ppid=4125 pid=4500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:45.673000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:45.682039 env[1202]: time="2024-12-13T14:31:45.681949996Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:45.682039 env[1202]: time="2024-12-13T14:31:45.682016633Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:45.682039 env[1202]: time="2024-12-13T14:31:45.682029889Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:45.682912 env[1202]: time="2024-12-13T14:31:45.682218980Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d pid=4512 runtime=io.containerd.runc.v2 Dec 13 14:31:45.696689 systemd[1]: Started cri-containerd-1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d.scope. Dec 13 14:31:45.704949 env[1202]: time="2024-12-13T14:31:45.704887223Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65c546cf68-5bqp7,Uid:ecb2651e-9af3-4fc2-95b6-4b69df48c1c1,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa\"" Dec 13 14:31:45.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.704000 audit: BPF prog-id=184 op=LOAD Dec 13 14:31:45.704000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.704000 audit[4524]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4512 pid=4524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:45.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134393462323237353138306536633461303362303637656362383861 Dec 13 14:31:45.704000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.704000 audit[4524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4512 pid=4524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:45.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134393462323237353138306536633461303362303637656362383861 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit: BPF prog-id=185 op=LOAD Dec 13 14:31:45.705000 audit[4524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003632a0 items=0 ppid=4512 pid=4524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:45.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134393462323237353138306536633461303362303637656362383861 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit: BPF prog-id=186 op=LOAD Dec 13 14:31:45.705000 audit[4524]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003632e8 items=0 ppid=4512 pid=4524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:45.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134393462323237353138306536633461303362303637656362383861 Dec 13 14:31:45.705000 audit: BPF prog-id=186 op=UNLOAD Dec 13 14:31:45.705000 audit: BPF prog-id=185 op=UNLOAD Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.705000 audit: BPF prog-id=187 op=LOAD Dec 13 14:31:45.705000 audit[4524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003636f8 items=0 ppid=4512 pid=4524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:45.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134393462323237353138306536633461303362303637656362383861 Dec 13 14:31:45.709011 env[1202]: time="2024-12-13T14:31:45.706129335Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:31:45.707965 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:31:45.730013 env[1202]: time="2024-12-13T14:31:45.729953776Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-wrcpk,Uid:f0a57d84-e132-4284-94a6-b96e0303f6d5,Namespace:kube-system,Attempt:1,} returns sandbox id \"1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d\"" Dec 13 14:31:45.730486 kubelet[1936]: E1213 14:31:45.730457 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:45.734056 env[1202]: time="2024-12-13T14:31:45.734022112Z" level=info msg="CreateContainer within sandbox \"1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:31:45.794985 env[1202]: time="2024-12-13T14:31:45.794941696Z" level=info msg="CreateContainer within sandbox \"1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"93a7446e40defa5ea8beb697325f913cce6575759b2e80bcab2d9817dc3a0c63\"" Dec 13 14:31:45.795807 env[1202]: time="2024-12-13T14:31:45.795624590Z" level=info msg="StartContainer for \"93a7446e40defa5ea8beb697325f913cce6575759b2e80bcab2d9817dc3a0c63\"" Dec 13 14:31:45.811266 systemd[1]: Started cri-containerd-93a7446e40defa5ea8beb697325f913cce6575759b2e80bcab2d9817dc3a0c63.scope. Dec 13 14:31:45.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.824000 audit: BPF prog-id=188 op=LOAD Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit[4563]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4512 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:45.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933613734343665343064656661356561386265623639373332356639 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit[4563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4512 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:45.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933613734343665343064656661356561386265623639373332356639 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit: BPF prog-id=189 op=LOAD Dec 13 14:31:45.825000 audit[4563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003b6230 items=0 ppid=4512 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:45.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933613734343665343064656661356561386265623639373332356639 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.825000 audit: BPF prog-id=190 op=LOAD Dec 13 14:31:45.825000 audit[4563]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003b6278 items=0 ppid=4512 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:45.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933613734343665343064656661356561386265623639373332356639 Dec 13 14:31:45.826000 audit: BPF prog-id=190 op=UNLOAD Dec 13 14:31:45.826000 audit: BPF prog-id=189 op=UNLOAD Dec 13 14:31:45.826000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.826000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.826000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.826000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.826000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.826000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.826000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.826000 audit[4563]: AVC avc: denied { perfmon } for pid=4563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.826000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.826000 audit[4563]: AVC avc: denied { bpf } for pid=4563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:45.826000 audit: BPF prog-id=191 op=LOAD Dec 13 14:31:45.826000 audit[4563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b6688 items=0 ppid=4512 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:45.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933613734343665343064656661356561386265623639373332356639 Dec 13 14:31:45.892560 env[1202]: time="2024-12-13T14:31:45.891890149Z" level=info msg="StopPodSandbox for \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\"" Dec 13 14:31:45.903249 env[1202]: time="2024-12-13T14:31:45.903193888Z" level=info msg="StartContainer for \"93a7446e40defa5ea8beb697325f913cce6575759b2e80bcab2d9817dc3a0c63\" returns successfully" Dec 13 14:31:46.090763 env[1202]: 2024-12-13 14:31:46.059 [INFO][4603] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Dec 13 14:31:46.090763 env[1202]: 2024-12-13 14:31:46.059 [INFO][4603] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" iface="eth0" netns="/var/run/netns/cni-fc88e925-cf85-e88d-cb04-a92713bbdaae" Dec 13 14:31:46.090763 env[1202]: 2024-12-13 14:31:46.059 [INFO][4603] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" iface="eth0" netns="/var/run/netns/cni-fc88e925-cf85-e88d-cb04-a92713bbdaae" Dec 13 14:31:46.090763 env[1202]: 2024-12-13 14:31:46.060 [INFO][4603] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" iface="eth0" netns="/var/run/netns/cni-fc88e925-cf85-e88d-cb04-a92713bbdaae" Dec 13 14:31:46.090763 env[1202]: 2024-12-13 14:31:46.060 [INFO][4603] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Dec 13 14:31:46.090763 env[1202]: 2024-12-13 14:31:46.060 [INFO][4603] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Dec 13 14:31:46.090763 env[1202]: 2024-12-13 14:31:46.079 [INFO][4610] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" HandleID="k8s-pod-network.4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Workload="localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0" Dec 13 14:31:46.090763 env[1202]: 2024-12-13 14:31:46.079 [INFO][4610] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:46.090763 env[1202]: 2024-12-13 14:31:46.080 [INFO][4610] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:46.090763 env[1202]: 2024-12-13 14:31:46.085 [WARNING][4610] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" HandleID="k8s-pod-network.4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Workload="localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0" Dec 13 14:31:46.090763 env[1202]: 2024-12-13 14:31:46.085 [INFO][4610] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" HandleID="k8s-pod-network.4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Workload="localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0" Dec 13 14:31:46.090763 env[1202]: 2024-12-13 14:31:46.086 [INFO][4610] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:46.090763 env[1202]: 2024-12-13 14:31:46.088 [INFO][4603] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Dec 13 14:31:46.091220 env[1202]: time="2024-12-13T14:31:46.090915158Z" level=info msg="TearDown network for sandbox \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\" successfully" Dec 13 14:31:46.091220 env[1202]: time="2024-12-13T14:31:46.090947751Z" level=info msg="StopPodSandbox for \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\" returns successfully" Dec 13 14:31:46.093206 systemd[1]: run-netns-cni\x2dfc88e925\x2dcf85\x2de88d\x2dcb04\x2da92713bbdaae.mount: Deactivated successfully. Dec 13 14:31:46.093446 kubelet[1936]: E1213 14:31:46.093416 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:46.094218 env[1202]: time="2024-12-13T14:31:46.094160842Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-h5wrj,Uid:aa1c80dd-0a17-4c41-926a-b2ddc897d0c9,Namespace:kube-system,Attempt:1,}" Dec 13 14:31:46.288979 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali49a13f407b7: link becomes ready Dec 13 14:31:46.289025 systemd-networkd[1025]: cali49a13f407b7: Link UP Dec 13 14:31:46.289589 systemd-networkd[1025]: cali49a13f407b7: Gained carrier Dec 13 14:31:46.307810 env[1202]: 2024-12-13 14:31:46.198 [INFO][4622] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0 coredns-6f6b679f8f- kube-system aa1c80dd-0a17-4c41-926a-b2ddc897d0c9 1105 0 2024-12-13 14:30:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-h5wrj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali49a13f407b7 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2" Namespace="kube-system" Pod="coredns-6f6b679f8f-h5wrj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--h5wrj-" Dec 13 14:31:46.307810 env[1202]: 2024-12-13 14:31:46.198 [INFO][4622] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2" Namespace="kube-system" Pod="coredns-6f6b679f8f-h5wrj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0" Dec 13 14:31:46.307810 env[1202]: 2024-12-13 14:31:46.229 [INFO][4639] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2" HandleID="k8s-pod-network.38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2" Workload="localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0" Dec 13 14:31:46.307810 env[1202]: 2024-12-13 14:31:46.238 [INFO][4639] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2" HandleID="k8s-pod-network.38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2" Workload="localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e7710), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-h5wrj", "timestamp":"2024-12-13 14:31:46.22900443 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:31:46.307810 env[1202]: 2024-12-13 14:31:46.238 [INFO][4639] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:46.307810 env[1202]: 2024-12-13 14:31:46.238 [INFO][4639] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:46.307810 env[1202]: 2024-12-13 14:31:46.238 [INFO][4639] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:31:46.307810 env[1202]: 2024-12-13 14:31:46.240 [INFO][4639] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2" host="localhost" Dec 13 14:31:46.307810 env[1202]: 2024-12-13 14:31:46.244 [INFO][4639] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:31:46.307810 env[1202]: 2024-12-13 14:31:46.248 [INFO][4639] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:31:46.307810 env[1202]: 2024-12-13 14:31:46.250 [INFO][4639] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:31:46.307810 env[1202]: 2024-12-13 14:31:46.252 [INFO][4639] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:31:46.307810 env[1202]: 2024-12-13 14:31:46.252 [INFO][4639] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2" host="localhost" Dec 13 14:31:46.307810 env[1202]: 2024-12-13 14:31:46.253 [INFO][4639] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2 Dec 13 14:31:46.307810 env[1202]: 2024-12-13 14:31:46.271 [INFO][4639] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2" host="localhost" Dec 13 14:31:46.307810 env[1202]: 2024-12-13 14:31:46.283 [INFO][4639] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2" host="localhost" Dec 13 14:31:46.307810 env[1202]: 2024-12-13 14:31:46.283 [INFO][4639] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2" host="localhost" Dec 13 14:31:46.307810 env[1202]: 2024-12-13 14:31:46.283 [INFO][4639] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:46.307810 env[1202]: 2024-12-13 14:31:46.283 [INFO][4639] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2" HandleID="k8s-pod-network.38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2" Workload="localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0" Dec 13 14:31:46.308820 env[1202]: 2024-12-13 14:31:46.285 [INFO][4622] cni-plugin/k8s.go 386: Populated endpoint ContainerID="38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2" Namespace="kube-system" Pod="coredns-6f6b679f8f-h5wrj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"aa1c80dd-0a17-4c41-926a-b2ddc897d0c9", ResourceVersion:"1105", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-h5wrj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali49a13f407b7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:46.308820 env[1202]: 2024-12-13 14:31:46.286 [INFO][4622] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2" Namespace="kube-system" Pod="coredns-6f6b679f8f-h5wrj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0" Dec 13 14:31:46.308820 env[1202]: 2024-12-13 14:31:46.286 [INFO][4622] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali49a13f407b7 ContainerID="38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2" Namespace="kube-system" Pod="coredns-6f6b679f8f-h5wrj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0" Dec 13 14:31:46.308820 env[1202]: 2024-12-13 14:31:46.290 [INFO][4622] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2" Namespace="kube-system" Pod="coredns-6f6b679f8f-h5wrj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0" Dec 13 14:31:46.308820 env[1202]: 2024-12-13 14:31:46.290 [INFO][4622] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2" Namespace="kube-system" Pod="coredns-6f6b679f8f-h5wrj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"aa1c80dd-0a17-4c41-926a-b2ddc897d0c9", ResourceVersion:"1105", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2", Pod:"coredns-6f6b679f8f-h5wrj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali49a13f407b7", MAC:"b6:c7:00:18:fd:0d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:46.308820 env[1202]: 2024-12-13 14:31:46.302 [INFO][4622] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2" Namespace="kube-system" Pod="coredns-6f6b679f8f-h5wrj" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0" Dec 13 14:31:46.322893 kernel: kauditd_printk_skb: 737 callbacks suppressed Dec 13 14:31:46.323001 kernel: audit: type=1325 audit(1734100306.316:1337): table=filter:103 family=2 entries=34 op=nft_register_chain pid=4663 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:46.323039 kernel: audit: type=1300 audit(1734100306.316:1337): arch=c000003e syscall=46 success=yes exit=18220 a0=3 a1=7ffd2b89e210 a2=0 a3=7ffd2b89e1fc items=0 ppid=4125 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.316000 audit[4663]: NETFILTER_CFG table=filter:103 family=2 entries=34 op=nft_register_chain pid=4663 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:46.316000 audit[4663]: SYSCALL arch=c000003e syscall=46 success=yes exit=18220 a0=3 a1=7ffd2b89e210 a2=0 a3=7ffd2b89e1fc items=0 ppid=4125 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.330632 kernel: audit: type=1327 audit(1734100306.316:1337): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:46.316000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:46.332986 env[1202]: time="2024-12-13T14:31:46.332914421Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:46.332986 env[1202]: time="2024-12-13T14:31:46.332955490Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:46.332986 env[1202]: time="2024-12-13T14:31:46.332965840Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:46.333244 env[1202]: time="2024-12-13T14:31:46.333183756Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2 pid=4671 runtime=io.containerd.runc.v2 Dec 13 14:31:46.351509 systemd[1]: Started cri-containerd-38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2.scope. Dec 13 14:31:46.352918 systemd[1]: Started sshd@19-10.0.0.133:22-10.0.0.1:48718.service. Dec 13 14:31:46.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.133:22-10.0.0.1:48718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.358906 kernel: audit: type=1130 audit(1734100306.351:1338): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.133:22-10.0.0.1:48718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.372992 kernel: audit: type=1400 audit(1734100306.364:1339): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.373028 kernel: audit: type=1400 audit(1734100306.364:1340): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.376212 kernel: audit: type=1400 audit(1734100306.364:1341): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.376269 kernel: audit: type=1400 audit(1734100306.364:1342): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.379317 kernel: audit: type=1400 audit(1734100306.365:1343): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.382592 kernel: audit: type=1400 audit(1734100306.365:1344): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.368000 audit: BPF prog-id=192 op=LOAD Dec 13 14:31:46.373000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.373000 audit[4681]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4671 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338643664343930343137383037313962393662396231316230366630 Dec 13 14:31:46.373000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.373000 audit[4681]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4671 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338643664343930343137383037313962393662396231316230366630 Dec 13 14:31:46.373000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.373000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.373000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.373000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.373000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.373000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.373000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.373000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.373000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.373000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.373000 audit: BPF prog-id=193 op=LOAD Dec 13 14:31:46.373000 audit[4681]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000212b60 items=0 ppid=4671 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338643664343930343137383037313962393662396231316230366630 Dec 13 14:31:46.374000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.374000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.374000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.374000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.374000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.374000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.374000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.374000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.374000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.374000 audit: BPF prog-id=194 op=LOAD Dec 13 14:31:46.374000 audit[4681]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000212ba8 items=0 ppid=4671 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338643664343930343137383037313962393662396231316230366630 Dec 13 14:31:46.377000 audit: BPF prog-id=194 op=UNLOAD Dec 13 14:31:46.377000 audit: BPF prog-id=193 op=UNLOAD Dec 13 14:31:46.377000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.377000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.377000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.377000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.377000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.377000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.377000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.377000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.377000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.377000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.377000 audit: BPF prog-id=195 op=LOAD Dec 13 14:31:46.377000 audit[4681]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000212fb8 items=0 ppid=4671 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338643664343930343137383037313962393662396231316230366630 Dec 13 14:31:46.386376 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:31:46.400000 audit[4691]: USER_ACCT pid=4691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:46.402722 sshd[4691]: Accepted publickey for core from 10.0.0.1 port 48718 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:31:46.401000 audit[4691]: CRED_ACQ pid=4691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:46.401000 audit[4691]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff003ba840 a2=3 a3=0 items=0 ppid=1 pid=4691 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.401000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:46.404269 sshd[4691]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:46.409594 systemd[1]: Started session-20.scope. Dec 13 14:31:46.410208 systemd-logind[1194]: New session 20 of user core. Dec 13 14:31:46.412574 env[1202]: time="2024-12-13T14:31:46.412536029Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-h5wrj,Uid:aa1c80dd-0a17-4c41-926a-b2ddc897d0c9,Namespace:kube-system,Attempt:1,} returns sandbox id \"38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2\"" Dec 13 14:31:46.413496 kubelet[1936]: E1213 14:31:46.413465 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:46.416800 env[1202]: time="2024-12-13T14:31:46.415756784Z" level=info msg="CreateContainer within sandbox \"38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:31:46.415000 audit[4691]: USER_START pid=4691 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:46.416000 audit[4707]: CRED_ACQ pid=4707 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:46.532024 sshd[4691]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:46.531000 audit[4691]: USER_END pid=4691 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:46.531000 audit[4691]: CRED_DISP pid=4691 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:46.534738 systemd[1]: sshd@19-10.0.0.133:22-10.0.0.1:48718.service: Deactivated successfully. Dec 13 14:31:46.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.133:22-10.0.0.1:48718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.535680 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:31:46.536303 systemd-logind[1194]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:31:46.537084 systemd-logind[1194]: Removed session 20. Dec 13 14:31:46.541066 env[1202]: time="2024-12-13T14:31:46.540981888Z" level=info msg="CreateContainer within sandbox \"38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"66cc68e02690d2b1f80818f6d1aed56edea47e757a5cf4bf2833a1abf84de74c\"" Dec 13 14:31:46.541469 env[1202]: time="2024-12-13T14:31:46.541448780Z" level=info msg="StartContainer for \"66cc68e02690d2b1f80818f6d1aed56edea47e757a5cf4bf2833a1abf84de74c\"" Dec 13 14:31:46.555533 systemd[1]: Started cri-containerd-66cc68e02690d2b1f80818f6d1aed56edea47e757a5cf4bf2833a1abf84de74c.scope. Dec 13 14:31:46.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit: BPF prog-id=196 op=LOAD Dec 13 14:31:46.566000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[4725]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4671 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636636336386530323639306432623166383038313866366431616564 Dec 13 14:31:46.566000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[4725]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4671 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636636336386530323639306432623166383038313866366431616564 Dec 13 14:31:46.566000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.566000 audit: BPF prog-id=197 op=LOAD Dec 13 14:31:46.566000 audit[4725]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000291d60 items=0 ppid=4671 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636636336386530323639306432623166383038313866366431616564 Dec 13 14:31:46.567000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.567000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.567000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.567000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.567000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.567000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.567000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.567000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.567000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.567000 audit: BPF prog-id=198 op=LOAD Dec 13 14:31:46.567000 audit[4725]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000291da8 items=0 ppid=4671 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636636336386530323639306432623166383038313866366431616564 Dec 13 14:31:46.567000 audit: BPF prog-id=198 op=UNLOAD Dec 13 14:31:46.567000 audit: BPF prog-id=197 op=UNLOAD Dec 13 14:31:46.567000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.567000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.567000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.567000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.567000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.567000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.567000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.567000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.567000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.567000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.567000 audit: BPF prog-id=199 op=LOAD Dec 13 14:31:46.567000 audit[4725]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002fc1b8 items=0 ppid=4671 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636636336386530323639306432623166383038313866366431616564 Dec 13 14:31:46.580386 env[1202]: time="2024-12-13T14:31:46.580334789Z" level=info msg="StartContainer for \"66cc68e02690d2b1f80818f6d1aed56edea47e757a5cf4bf2833a1abf84de74c\" returns successfully" Dec 13 14:31:46.650813 kubelet[1936]: E1213 14:31:46.650767 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:46.654889 kubelet[1936]: E1213 14:31:46.654478 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:46.669855 kubelet[1936]: I1213 14:31:46.669763 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-h5wrj" podStartSLOduration=77.669739523 podStartE2EDuration="1m17.669739523s" podCreationTimestamp="2024-12-13 14:30:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:31:46.660062008 +0000 UTC m=+84.853849551" watchObservedRunningTime="2024-12-13 14:31:46.669739523 +0000 UTC m=+84.863527066" Dec 13 14:31:46.670212 kubelet[1936]: I1213 14:31:46.670175 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-wrcpk" podStartSLOduration=77.670168892 podStartE2EDuration="1m17.670168892s" podCreationTimestamp="2024-12-13 14:30:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:31:46.669700779 +0000 UTC m=+84.863488332" watchObservedRunningTime="2024-12-13 14:31:46.670168892 +0000 UTC m=+84.863956435" Dec 13 14:31:46.784000 audit[4758]: NETFILTER_CFG table=filter:104 family=2 entries=13 op=nft_register_rule pid=4758 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:46.784000 audit[4758]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd9b111db0 a2=0 a3=7ffd9b111d9c items=0 ppid=2085 pid=4758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.784000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:46.800000 audit[4758]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=4758 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:46.800000 audit[4758]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd9b111db0 a2=0 a3=7ffd9b111d9c items=0 ppid=2085 pid=4758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.800000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:46.833000 audit[4761]: NETFILTER_CFG table=filter:106 family=2 entries=10 op=nft_register_rule pid=4761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:46.833000 audit[4761]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff640bb880 a2=0 a3=7fff640bb86c items=0 ppid=2085 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.833000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:46.845000 audit[4761]: NETFILTER_CFG table=nat:107 family=2 entries=56 op=nft_register_chain pid=4761 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:46.845000 audit[4761]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff640bb880 a2=0 a3=7fff640bb86c items=0 ppid=2085 pid=4761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.845000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:46.940013 systemd-networkd[1025]: cali5e32d82cbae: Gained IPv6LL Dec 13 14:31:47.516074 systemd-networkd[1025]: calib036bfdb5cd: Gained IPv6LL Dec 13 14:31:47.656442 kubelet[1936]: E1213 14:31:47.656092 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:47.656442 kubelet[1936]: E1213 14:31:47.656355 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:47.891931 kubelet[1936]: E1213 14:31:47.891892 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:48.220105 systemd-networkd[1025]: cali49a13f407b7: Gained IPv6LL Dec 13 14:31:48.657957 kubelet[1936]: E1213 14:31:48.657919 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:48.657957 kubelet[1936]: E1213 14:31:48.657968 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:49.696679 env[1202]: time="2024-12-13T14:31:49.696610710Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:49.698951 env[1202]: time="2024-12-13T14:31:49.698895715Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:49.700561 env[1202]: time="2024-12-13T14:31:49.700528796Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:49.702250 env[1202]: time="2024-12-13T14:31:49.702212324Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:49.702785 env[1202]: time="2024-12-13T14:31:49.702746522Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:31:49.704972 env[1202]: time="2024-12-13T14:31:49.704931286Z" level=info msg="CreateContainer within sandbox \"90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:31:49.719812 env[1202]: time="2024-12-13T14:31:49.719756368Z" level=info msg="CreateContainer within sandbox \"90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"994c7f41526f961baf243052ba7b85924014edc07c66253dd44ed3f9066bb4f6\"" Dec 13 14:31:49.720212 env[1202]: time="2024-12-13T14:31:49.720178472Z" level=info msg="StartContainer for \"994c7f41526f961baf243052ba7b85924014edc07c66253dd44ed3f9066bb4f6\"" Dec 13 14:31:49.739573 systemd[1]: run-containerd-runc-k8s.io-994c7f41526f961baf243052ba7b85924014edc07c66253dd44ed3f9066bb4f6-runc.rXwXeO.mount: Deactivated successfully. Dec 13 14:31:49.742617 systemd[1]: Started cri-containerd-994c7f41526f961baf243052ba7b85924014edc07c66253dd44ed3f9066bb4f6.scope. Dec 13 14:31:49.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.753000 audit: BPF prog-id=200 op=LOAD Dec 13 14:31:49.753000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.753000 audit[4777]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4465 pid=4777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:49.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939346337663431353236663936316261663234333035326261376238 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4465 pid=4777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:49.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939346337663431353236663936316261663234333035326261376238 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit: BPF prog-id=201 op=LOAD Dec 13 14:31:49.754000 audit[4777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000208380 items=0 ppid=4465 pid=4777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:49.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939346337663431353236663936316261663234333035326261376238 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit: BPF prog-id=202 op=LOAD Dec 13 14:31:49.754000 audit[4777]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002083c8 items=0 ppid=4465 pid=4777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:49.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939346337663431353236663936316261663234333035326261376238 Dec 13 14:31:49.754000 audit: BPF prog-id=202 op=UNLOAD Dec 13 14:31:49.754000 audit: BPF prog-id=201 op=UNLOAD Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { perfmon } for pid=4777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit[4777]: AVC avc: denied { bpf } for pid=4777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:49.754000 audit: BPF prog-id=203 op=LOAD Dec 13 14:31:49.754000 audit[4777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002087d8 items=0 ppid=4465 pid=4777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:49.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939346337663431353236663936316261663234333035326261376238 Dec 13 14:31:49.778942 env[1202]: time="2024-12-13T14:31:49.778877543Z" level=info msg="StartContainer for \"994c7f41526f961baf243052ba7b85924014edc07c66253dd44ed3f9066bb4f6\" returns successfully" Dec 13 14:31:49.891763 env[1202]: time="2024-12-13T14:31:49.891593321Z" level=info msg="StopPodSandbox for \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\"" Dec 13 14:31:49.990318 env[1202]: 2024-12-13 14:31:49.957 [INFO][4823] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Dec 13 14:31:49.990318 env[1202]: 2024-12-13 14:31:49.957 [INFO][4823] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" iface="eth0" netns="/var/run/netns/cni-70e65f96-a829-d6cb-bd82-f7e9ace04016" Dec 13 14:31:49.990318 env[1202]: 2024-12-13 14:31:49.957 [INFO][4823] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" iface="eth0" netns="/var/run/netns/cni-70e65f96-a829-d6cb-bd82-f7e9ace04016" Dec 13 14:31:49.990318 env[1202]: 2024-12-13 14:31:49.957 [INFO][4823] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" iface="eth0" netns="/var/run/netns/cni-70e65f96-a829-d6cb-bd82-f7e9ace04016" Dec 13 14:31:49.990318 env[1202]: 2024-12-13 14:31:49.957 [INFO][4823] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Dec 13 14:31:49.990318 env[1202]: 2024-12-13 14:31:49.957 [INFO][4823] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Dec 13 14:31:49.990318 env[1202]: 2024-12-13 14:31:49.978 [INFO][4831] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" HandleID="k8s-pod-network.ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Workload="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0" Dec 13 14:31:49.990318 env[1202]: 2024-12-13 14:31:49.978 [INFO][4831] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:49.990318 env[1202]: 2024-12-13 14:31:49.978 [INFO][4831] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:49.990318 env[1202]: 2024-12-13 14:31:49.984 [WARNING][4831] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" HandleID="k8s-pod-network.ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Workload="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0" Dec 13 14:31:49.990318 env[1202]: 2024-12-13 14:31:49.984 [INFO][4831] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" HandleID="k8s-pod-network.ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Workload="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0" Dec 13 14:31:49.990318 env[1202]: 2024-12-13 14:31:49.986 [INFO][4831] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:49.990318 env[1202]: 2024-12-13 14:31:49.987 [INFO][4823] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Dec 13 14:31:49.990318 env[1202]: time="2024-12-13T14:31:49.989069659Z" level=info msg="TearDown network for sandbox \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\" successfully" Dec 13 14:31:49.990318 env[1202]: time="2024-12-13T14:31:49.989109515Z" level=info msg="StopPodSandbox for \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\" returns successfully" Dec 13 14:31:49.990318 env[1202]: time="2024-12-13T14:31:49.989917976Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-856cb6d94c-5hc9r,Uid:0076d11e-8179-4a1b-b0bb-1e2f984b0e09,Namespace:calico-system,Attempt:1,}" Dec 13 14:31:50.330476 systemd-networkd[1025]: cali372940160e7: Link UP Dec 13 14:31:50.333422 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:31:50.333483 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali372940160e7: link becomes ready Dec 13 14:31:50.333105 systemd-networkd[1025]: cali372940160e7: Gained carrier Dec 13 14:31:50.398727 env[1202]: 2024-12-13 14:31:50.032 [INFO][4840] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0 calico-kube-controllers-856cb6d94c- calico-system 0076d11e-8179-4a1b-b0bb-1e2f984b0e09 1153 0 2024-12-13 14:30:39 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:856cb6d94c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-856cb6d94c-5hc9r eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali372940160e7 [] []}} ContainerID="31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406" Namespace="calico-system" Pod="calico-kube-controllers-856cb6d94c-5hc9r" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-" Dec 13 14:31:50.398727 env[1202]: 2024-12-13 14:31:50.032 [INFO][4840] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406" Namespace="calico-system" Pod="calico-kube-controllers-856cb6d94c-5hc9r" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0" Dec 13 14:31:50.398727 env[1202]: 2024-12-13 14:31:50.059 [INFO][4852] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406" HandleID="k8s-pod-network.31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406" Workload="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0" Dec 13 14:31:50.398727 env[1202]: 2024-12-13 14:31:50.067 [INFO][4852] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406" HandleID="k8s-pod-network.31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406" Workload="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000308840), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-856cb6d94c-5hc9r", "timestamp":"2024-12-13 14:31:50.059307544 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:31:50.398727 env[1202]: 2024-12-13 14:31:50.068 [INFO][4852] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:50.398727 env[1202]: 2024-12-13 14:31:50.068 [INFO][4852] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:50.398727 env[1202]: 2024-12-13 14:31:50.068 [INFO][4852] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:31:50.398727 env[1202]: 2024-12-13 14:31:50.069 [INFO][4852] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406" host="localhost" Dec 13 14:31:50.398727 env[1202]: 2024-12-13 14:31:50.076 [INFO][4852] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:31:50.398727 env[1202]: 2024-12-13 14:31:50.122 [INFO][4852] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:31:50.398727 env[1202]: 2024-12-13 14:31:50.123 [INFO][4852] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:31:50.398727 env[1202]: 2024-12-13 14:31:50.147 [INFO][4852] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:31:50.398727 env[1202]: 2024-12-13 14:31:50.147 [INFO][4852] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406" host="localhost" Dec 13 14:31:50.398727 env[1202]: 2024-12-13 14:31:50.148 [INFO][4852] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406 Dec 13 14:31:50.398727 env[1202]: 2024-12-13 14:31:50.186 [INFO][4852] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406" host="localhost" Dec 13 14:31:50.398727 env[1202]: 2024-12-13 14:31:50.326 [INFO][4852] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406" host="localhost" Dec 13 14:31:50.398727 env[1202]: 2024-12-13 14:31:50.326 [INFO][4852] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406" host="localhost" Dec 13 14:31:50.398727 env[1202]: 2024-12-13 14:31:50.326 [INFO][4852] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:50.398727 env[1202]: 2024-12-13 14:31:50.326 [INFO][4852] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406" HandleID="k8s-pod-network.31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406" Workload="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0" Dec 13 14:31:50.399364 env[1202]: 2024-12-13 14:31:50.329 [INFO][4840] cni-plugin/k8s.go 386: Populated endpoint ContainerID="31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406" Namespace="calico-system" Pod="calico-kube-controllers-856cb6d94c-5hc9r" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0", GenerateName:"calico-kube-controllers-856cb6d94c-", Namespace:"calico-system", SelfLink:"", UID:"0076d11e-8179-4a1b-b0bb-1e2f984b0e09", ResourceVersion:"1153", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"856cb6d94c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-856cb6d94c-5hc9r", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali372940160e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:50.399364 env[1202]: 2024-12-13 14:31:50.329 [INFO][4840] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406" Namespace="calico-system" Pod="calico-kube-controllers-856cb6d94c-5hc9r" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0" Dec 13 14:31:50.399364 env[1202]: 2024-12-13 14:31:50.329 [INFO][4840] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali372940160e7 ContainerID="31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406" Namespace="calico-system" Pod="calico-kube-controllers-856cb6d94c-5hc9r" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0" Dec 13 14:31:50.399364 env[1202]: 2024-12-13 14:31:50.333 [INFO][4840] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406" Namespace="calico-system" Pod="calico-kube-controllers-856cb6d94c-5hc9r" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0" Dec 13 14:31:50.399364 env[1202]: 2024-12-13 14:31:50.334 [INFO][4840] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406" Namespace="calico-system" Pod="calico-kube-controllers-856cb6d94c-5hc9r" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0", GenerateName:"calico-kube-controllers-856cb6d94c-", Namespace:"calico-system", SelfLink:"", UID:"0076d11e-8179-4a1b-b0bb-1e2f984b0e09", ResourceVersion:"1153", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"856cb6d94c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406", Pod:"calico-kube-controllers-856cb6d94c-5hc9r", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali372940160e7", MAC:"46:ab:96:3c:d5:9f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:50.399364 env[1202]: 2024-12-13 14:31:50.396 [INFO][4840] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406" Namespace="calico-system" Pod="calico-kube-controllers-856cb6d94c-5hc9r" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0" Dec 13 14:31:50.407000 audit[4876]: NETFILTER_CFG table=filter:108 family=2 entries=46 op=nft_register_chain pid=4876 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:50.407000 audit[4876]: SYSCALL arch=c000003e syscall=46 success=yes exit=22712 a0=3 a1=7ffe432dc620 a2=0 a3=7ffe432dc60c items=0 ppid=4125 pid=4876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:50.407000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:50.425466 env[1202]: time="2024-12-13T14:31:50.425379665Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:50.425466 env[1202]: time="2024-12-13T14:31:50.425426895Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:50.425466 env[1202]: time="2024-12-13T14:31:50.425439569Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:50.425683 env[1202]: time="2024-12-13T14:31:50.425633318Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406 pid=4884 runtime=io.containerd.runc.v2 Dec 13 14:31:50.449831 systemd[1]: Started cri-containerd-31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406.scope. Dec 13 14:31:50.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.460000 audit: BPF prog-id=204 op=LOAD Dec 13 14:31:50.460000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.460000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4884 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:50.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331633432313265646239306166643036616261383065373330393433 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4884 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:50.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331633432313265646239306166643036616261383065373330393433 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit: BPF prog-id=205 op=LOAD Dec 13 14:31:50.461000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002c0f50 items=0 ppid=4884 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:50.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331633432313265646239306166643036616261383065373330393433 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit: BPF prog-id=206 op=LOAD Dec 13 14:31:50.461000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002c0f98 items=0 ppid=4884 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:50.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331633432313265646239306166643036616261383065373330393433 Dec 13 14:31:50.461000 audit: BPF prog-id=206 op=UNLOAD Dec 13 14:31:50.461000 audit: BPF prog-id=205 op=UNLOAD Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:50.461000 audit: BPF prog-id=207 op=LOAD Dec 13 14:31:50.461000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002c13a8 items=0 ppid=4884 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:50.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331633432313265646239306166643036616261383065373330393433 Dec 13 14:31:50.463016 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:31:50.486004 env[1202]: time="2024-12-13T14:31:50.485960264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-856cb6d94c-5hc9r,Uid:0076d11e-8179-4a1b-b0bb-1e2f984b0e09,Namespace:calico-system,Attempt:1,} returns sandbox id \"31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406\"" Dec 13 14:31:50.487752 env[1202]: time="2024-12-13T14:31:50.487701211Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:31:50.686000 audit[4918]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4918 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:50.686000 audit[4918]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff93f61560 a2=0 a3=7fff93f6154c items=0 ppid=2085 pid=4918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:50.686000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:50.692000 audit[4918]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=4918 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:50.692000 audit[4918]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff93f61560 a2=0 a3=7fff93f6154c items=0 ppid=2085 pid=4918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:50.692000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:50.717932 systemd[1]: run-netns-cni\x2d70e65f96\x2da829\x2dd6cb\x2dbd82\x2df7e9ace04016.mount: Deactivated successfully. Dec 13 14:31:50.719000 audit[4787]: AVC avc: denied { watch } for pid=4787 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_30_54.2906504496/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c157,c860 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c157,c860 tclass=file permissive=0 Dec 13 14:31:50.719000 audit[4787]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00035c4e0 a2=fc6 a3=0 items=0 ppid=4465 pid=4787 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c157,c860 key=(null) Dec 13 14:31:50.719000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:31:50.733226 kubelet[1936]: I1213 14:31:50.733171 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-65c546cf68-5bqp7" podStartSLOduration=67.735428504 podStartE2EDuration="1m11.733154325s" podCreationTimestamp="2024-12-13 14:30:39 +0000 UTC" firstStartedPulling="2024-12-13 14:31:45.705887784 +0000 UTC m=+83.899675317" lastFinishedPulling="2024-12-13 14:31:49.703613605 +0000 UTC m=+87.897401138" observedRunningTime="2024-12-13 14:31:50.672098359 +0000 UTC m=+88.865885923" watchObservedRunningTime="2024-12-13 14:31:50.733154325 +0000 UTC m=+88.926941868" Dec 13 14:31:50.741000 audit[4920]: NETFILTER_CFG table=filter:111 family=2 entries=9 op=nft_register_rule pid=4920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:50.741000 audit[4920]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd0a1cebc0 a2=0 a3=7ffd0a1cebac items=0 ppid=2085 pid=4920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:50.741000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:50.746000 audit[4920]: NETFILTER_CFG table=nat:112 family=2 entries=27 op=nft_register_chain pid=4920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:50.746000 audit[4920]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd0a1cebc0 a2=0 a3=7ffd0a1cebac items=0 ppid=2085 pid=4920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:50.746000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:50.891571 env[1202]: time="2024-12-13T14:31:50.891525365Z" level=info msg="StopPodSandbox for \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\"" Dec 13 14:31:50.966105 env[1202]: 2024-12-13 14:31:50.933 [INFO][4938] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Dec 13 14:31:50.966105 env[1202]: 2024-12-13 14:31:50.933 [INFO][4938] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" iface="eth0" netns="/var/run/netns/cni-dc4ea8a9-4225-dd7f-1e9e-49740c92ae25" Dec 13 14:31:50.966105 env[1202]: 2024-12-13 14:31:50.933 [INFO][4938] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" iface="eth0" netns="/var/run/netns/cni-dc4ea8a9-4225-dd7f-1e9e-49740c92ae25" Dec 13 14:31:50.966105 env[1202]: 2024-12-13 14:31:50.933 [INFO][4938] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" iface="eth0" netns="/var/run/netns/cni-dc4ea8a9-4225-dd7f-1e9e-49740c92ae25" Dec 13 14:31:50.966105 env[1202]: 2024-12-13 14:31:50.933 [INFO][4938] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Dec 13 14:31:50.966105 env[1202]: 2024-12-13 14:31:50.933 [INFO][4938] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Dec 13 14:31:50.966105 env[1202]: 2024-12-13 14:31:50.956 [INFO][4946] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" HandleID="k8s-pod-network.c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Workload="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0" Dec 13 14:31:50.966105 env[1202]: 2024-12-13 14:31:50.956 [INFO][4946] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:50.966105 env[1202]: 2024-12-13 14:31:50.956 [INFO][4946] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:50.966105 env[1202]: 2024-12-13 14:31:50.961 [WARNING][4946] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" HandleID="k8s-pod-network.c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Workload="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0" Dec 13 14:31:50.966105 env[1202]: 2024-12-13 14:31:50.961 [INFO][4946] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" HandleID="k8s-pod-network.c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Workload="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0" Dec 13 14:31:50.966105 env[1202]: 2024-12-13 14:31:50.962 [INFO][4946] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:50.966105 env[1202]: 2024-12-13 14:31:50.964 [INFO][4938] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Dec 13 14:31:50.967981 env[1202]: time="2024-12-13T14:31:50.967938465Z" level=info msg="TearDown network for sandbox \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\" successfully" Dec 13 14:31:50.968100 env[1202]: time="2024-12-13T14:31:50.967980895Z" level=info msg="StopPodSandbox for \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\" returns successfully" Dec 13 14:31:50.968757 systemd[1]: run-netns-cni\x2ddc4ea8a9\x2d4225\x2ddd7f\x2d1e9e\x2d49740c92ae25.mount: Deactivated successfully. Dec 13 14:31:50.969757 env[1202]: time="2024-12-13T14:31:50.969724347Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65c546cf68-4mhg9,Uid:f39245bb-41cd-43ab-822c-851b5676f474,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:31:51.083859 systemd-networkd[1025]: calid558e44b280: Link UP Dec 13 14:31:51.085285 systemd-networkd[1025]: calid558e44b280: Gained carrier Dec 13 14:31:51.085876 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid558e44b280: link becomes ready Dec 13 14:31:51.148918 env[1202]: 2024-12-13 14:31:51.013 [INFO][4955] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0 calico-apiserver-65c546cf68- calico-apiserver f39245bb-41cd-43ab-822c-851b5676f474 1174 0 2024-12-13 14:30:39 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:65c546cf68 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-65c546cf68-4mhg9 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid558e44b280 [] []}} ContainerID="4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202" Namespace="calico-apiserver" Pod="calico-apiserver-65c546cf68-4mhg9" WorkloadEndpoint="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-" Dec 13 14:31:51.148918 env[1202]: 2024-12-13 14:31:51.013 [INFO][4955] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202" Namespace="calico-apiserver" Pod="calico-apiserver-65c546cf68-4mhg9" WorkloadEndpoint="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0" Dec 13 14:31:51.148918 env[1202]: 2024-12-13 14:31:51.039 [INFO][4968] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202" HandleID="k8s-pod-network.4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202" Workload="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0" Dec 13 14:31:51.148918 env[1202]: 2024-12-13 14:31:51.053 [INFO][4968] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202" HandleID="k8s-pod-network.4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202" Workload="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00011c610), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-65c546cf68-4mhg9", "timestamp":"2024-12-13 14:31:51.039911297 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:31:51.148918 env[1202]: 2024-12-13 14:31:51.053 [INFO][4968] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:51.148918 env[1202]: 2024-12-13 14:31:51.053 [INFO][4968] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:51.148918 env[1202]: 2024-12-13 14:31:51.053 [INFO][4968] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:31:51.148918 env[1202]: 2024-12-13 14:31:51.055 [INFO][4968] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202" host="localhost" Dec 13 14:31:51.148918 env[1202]: 2024-12-13 14:31:51.060 [INFO][4968] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:31:51.148918 env[1202]: 2024-12-13 14:31:51.064 [INFO][4968] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:31:51.148918 env[1202]: 2024-12-13 14:31:51.065 [INFO][4968] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:31:51.148918 env[1202]: 2024-12-13 14:31:51.067 [INFO][4968] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:31:51.148918 env[1202]: 2024-12-13 14:31:51.067 [INFO][4968] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202" host="localhost" Dec 13 14:31:51.148918 env[1202]: 2024-12-13 14:31:51.069 [INFO][4968] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202 Dec 13 14:31:51.148918 env[1202]: 2024-12-13 14:31:51.073 [INFO][4968] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202" host="localhost" Dec 13 14:31:51.148918 env[1202]: 2024-12-13 14:31:51.078 [INFO][4968] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202" host="localhost" Dec 13 14:31:51.148918 env[1202]: 2024-12-13 14:31:51.078 [INFO][4968] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202" host="localhost" Dec 13 14:31:51.148918 env[1202]: 2024-12-13 14:31:51.078 [INFO][4968] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:51.148918 env[1202]: 2024-12-13 14:31:51.078 [INFO][4968] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202" HandleID="k8s-pod-network.4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202" Workload="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0" Dec 13 14:31:51.149525 env[1202]: 2024-12-13 14:31:51.081 [INFO][4955] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202" Namespace="calico-apiserver" Pod="calico-apiserver-65c546cf68-4mhg9" WorkloadEndpoint="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0", GenerateName:"calico-apiserver-65c546cf68-", Namespace:"calico-apiserver", SelfLink:"", UID:"f39245bb-41cd-43ab-822c-851b5676f474", ResourceVersion:"1174", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65c546cf68", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-65c546cf68-4mhg9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid558e44b280", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:51.149525 env[1202]: 2024-12-13 14:31:51.082 [INFO][4955] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202" Namespace="calico-apiserver" Pod="calico-apiserver-65c546cf68-4mhg9" WorkloadEndpoint="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0" Dec 13 14:31:51.149525 env[1202]: 2024-12-13 14:31:51.082 [INFO][4955] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid558e44b280 ContainerID="4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202" Namespace="calico-apiserver" Pod="calico-apiserver-65c546cf68-4mhg9" WorkloadEndpoint="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0" Dec 13 14:31:51.149525 env[1202]: 2024-12-13 14:31:51.085 [INFO][4955] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202" Namespace="calico-apiserver" Pod="calico-apiserver-65c546cf68-4mhg9" WorkloadEndpoint="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0" Dec 13 14:31:51.149525 env[1202]: 2024-12-13 14:31:51.085 [INFO][4955] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202" Namespace="calico-apiserver" Pod="calico-apiserver-65c546cf68-4mhg9" WorkloadEndpoint="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0", GenerateName:"calico-apiserver-65c546cf68-", Namespace:"calico-apiserver", SelfLink:"", UID:"f39245bb-41cd-43ab-822c-851b5676f474", ResourceVersion:"1174", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65c546cf68", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202", Pod:"calico-apiserver-65c546cf68-4mhg9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid558e44b280", MAC:"62:a8:80:53:e1:40", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:51.149525 env[1202]: 2024-12-13 14:31:51.146 [INFO][4955] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202" Namespace="calico-apiserver" Pod="calico-apiserver-65c546cf68-4mhg9" WorkloadEndpoint="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0" Dec 13 14:31:51.209000 audit[4991]: NETFILTER_CFG table=filter:113 family=2 entries=46 op=nft_register_chain pid=4991 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:51.209000 audit[4991]: SYSCALL arch=c000003e syscall=46 success=yes exit=23892 a0=3 a1=7ffc819259a0 a2=0 a3=7ffc8192598c items=0 ppid=4125 pid=4991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:51.209000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:51.243377 env[1202]: time="2024-12-13T14:31:51.243225339Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:51.243377 env[1202]: time="2024-12-13T14:31:51.243267930Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:51.243377 env[1202]: time="2024-12-13T14:31:51.243279031Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:51.243535 env[1202]: time="2024-12-13T14:31:51.243414018Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202 pid=4999 runtime=io.containerd.runc.v2 Dec 13 14:31:51.256806 systemd[1]: Started cri-containerd-4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202.scope. Dec 13 14:31:51.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit: BPF prog-id=208 op=LOAD Dec 13 14:31:51.267000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[5008]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4999 pid=5008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:51.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465616265353839623534623463343761663831666635333730643935 Dec 13 14:31:51.267000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[5008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4999 pid=5008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:51.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465616265353839623534623463343761663831666635333730643935 Dec 13 14:31:51.267000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.267000 audit: BPF prog-id=209 op=LOAD Dec 13 14:31:51.267000 audit[5008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e5a30 items=0 ppid=4999 pid=5008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:51.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465616265353839623534623463343761663831666635333730643935 Dec 13 14:31:51.268000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.268000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.268000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.268000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.268000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.268000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.268000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.268000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.268000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.268000 audit: BPF prog-id=210 op=LOAD Dec 13 14:31:51.268000 audit[5008]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e5a78 items=0 ppid=4999 pid=5008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:51.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465616265353839623534623463343761663831666635333730643935 Dec 13 14:31:51.268000 audit: BPF prog-id=210 op=UNLOAD Dec 13 14:31:51.268000 audit: BPF prog-id=209 op=UNLOAD Dec 13 14:31:51.268000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.268000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.268000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.268000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.268000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.268000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.268000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.268000 audit[5008]: AVC avc: denied { perfmon } for pid=5008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.268000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.268000 audit[5008]: AVC avc: denied { bpf } for pid=5008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.268000 audit: BPF prog-id=211 op=LOAD Dec 13 14:31:51.268000 audit[5008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e5e88 items=0 ppid=4999 pid=5008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:51.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465616265353839623534623463343761663831666635333730643935 Dec 13 14:31:51.269709 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:31:51.290831 env[1202]: time="2024-12-13T14:31:51.290796331Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65c546cf68-4mhg9,Uid:f39245bb-41cd-43ab-822c-851b5676f474,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202\"" Dec 13 14:31:51.295683 env[1202]: time="2024-12-13T14:31:51.295627611Z" level=info msg="CreateContainer within sandbox \"4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:31:51.313410 env[1202]: time="2024-12-13T14:31:51.313364305Z" level=info msg="CreateContainer within sandbox \"4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"ef7e2c9194262b643498e0562400a2aa6850c9844df84acf9de61c17204ef0dd\"" Dec 13 14:31:51.313899 env[1202]: time="2024-12-13T14:31:51.313865429Z" level=info msg="StartContainer for \"ef7e2c9194262b643498e0562400a2aa6850c9844df84acf9de61c17204ef0dd\"" Dec 13 14:31:51.328112 systemd[1]: Started cri-containerd-ef7e2c9194262b643498e0562400a2aa6850c9844df84acf9de61c17204ef0dd.scope. Dec 13 14:31:51.347346 kernel: kauditd_printk_skb: 322 callbacks suppressed Dec 13 14:31:51.347489 kernel: audit: type=1400 audit(1734100311.339:1448): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347511 kernel: audit: type=1400 audit(1734100311.339:1449): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.352674 kernel: audit: type=1400 audit(1734100311.339:1450): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.355762 kernel: audit: type=1400 audit(1734100311.339:1451): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.362873 kernel: audit: type=1400 audit(1734100311.339:1452): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.362936 kernel: audit: type=1400 audit(1734100311.339:1453): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.362961 kernel: audit: type=1400 audit(1734100311.339:1454): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.368156 kernel: audit: type=1400 audit(1734100311.339:1455): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.368216 kernel: audit: type=1400 audit(1734100311.339:1456): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.373921 kernel: audit: type=1400 audit(1734100311.343:1457): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.343000 audit: BPF prog-id=212 op=LOAD Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit[5039]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4999 pid=5039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:51.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566376532633931393432363262363433343938653035363234303061 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit[5039]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4999 pid=5039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:51.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566376532633931393432363262363433343938653035363234303061 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit: BPF prog-id=213 op=LOAD Dec 13 14:31:51.347000 audit[5039]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000e1d10 items=0 ppid=4999 pid=5039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:51.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566376532633931393432363262363433343938653035363234303061 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.347000 audit: BPF prog-id=214 op=LOAD Dec 13 14:31:51.347000 audit[5039]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000e1d58 items=0 ppid=4999 pid=5039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:51.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566376532633931393432363262363433343938653035363234303061 Dec 13 14:31:51.351000 audit: BPF prog-id=214 op=UNLOAD Dec 13 14:31:51.351000 audit: BPF prog-id=213 op=UNLOAD Dec 13 14:31:51.351000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.351000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.351000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.351000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.351000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.351000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.351000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.351000 audit[5039]: AVC avc: denied { perfmon } for pid=5039 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.351000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.351000 audit[5039]: AVC avc: denied { bpf } for pid=5039 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:51.351000 audit: BPF prog-id=215 op=LOAD Dec 13 14:31:51.351000 audit[5039]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ca168 items=0 ppid=4999 pid=5039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:51.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566376532633931393432363262363433343938653035363234303061 Dec 13 14:31:51.401387 env[1202]: time="2024-12-13T14:31:51.401337139Z" level=info msg="StartContainer for \"ef7e2c9194262b643498e0562400a2aa6850c9844df84acf9de61c17204ef0dd\" returns successfully" Dec 13 14:31:51.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.133:22-10.0.0.1:34520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:51.537206 systemd[1]: Started sshd@20-10.0.0.133:22-10.0.0.1:34520.service. Dec 13 14:31:51.578000 audit[5071]: USER_ACCT pid=5071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:51.579413 sshd[5071]: Accepted publickey for core from 10.0.0.1 port 34520 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:31:51.579000 audit[5071]: CRED_ACQ pid=5071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:51.579000 audit[5071]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda228f8e0 a2=3 a3=0 items=0 ppid=1 pid=5071 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:51.579000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:51.580745 sshd[5071]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:51.584651 systemd-logind[1194]: New session 21 of user core. Dec 13 14:31:51.585535 systemd[1]: Started session-21.scope. Dec 13 14:31:51.589000 audit[5071]: USER_START pid=5071 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:51.591000 audit[5073]: CRED_ACQ pid=5073 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:51.751364 kubelet[1936]: I1213 14:31:51.751305 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-65c546cf68-4mhg9" podStartSLOduration=72.751286246 podStartE2EDuration="1m12.751286246s" podCreationTimestamp="2024-12-13 14:30:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:31:51.751121954 +0000 UTC m=+89.944909507" watchObservedRunningTime="2024-12-13 14:31:51.751286246 +0000 UTC m=+89.945073789" Dec 13 14:31:51.764000 audit[5083]: NETFILTER_CFG table=filter:114 family=2 entries=8 op=nft_register_rule pid=5083 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:51.764000 audit[5083]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdd04a5b30 a2=0 a3=7ffdd04a5b1c items=0 ppid=2085 pid=5083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:51.764000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:51.768000 audit[5083]: NETFILTER_CFG table=nat:115 family=2 entries=30 op=nft_register_rule pid=5083 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:51.768000 audit[5083]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffdd04a5b30 a2=0 a3=7ffdd04a5b1c items=0 ppid=2085 pid=5083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:51.768000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:51.864408 sshd[5071]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:51.865000 audit[5071]: USER_END pid=5071 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:51.865000 audit[5071]: CRED_DISP pid=5071 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:51.867220 systemd[1]: sshd@20-10.0.0.133:22-10.0.0.1:34520.service: Deactivated successfully. Dec 13 14:31:51.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.133:22-10.0.0.1:34520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:51.867802 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:31:51.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.133:22-10.0.0.1:34534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:51.870198 systemd[1]: Started sshd@21-10.0.0.133:22-10.0.0.1:34534.service. Dec 13 14:31:51.871273 systemd-logind[1194]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:31:51.872368 systemd-logind[1194]: Removed session 21. Dec 13 14:31:51.893168 env[1202]: time="2024-12-13T14:31:51.892536730Z" level=info msg="StopPodSandbox for \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\"" Dec 13 14:31:51.908000 audit[5086]: USER_ACCT pid=5086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:51.909278 sshd[5086]: Accepted publickey for core from 10.0.0.1 port 34534 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:31:51.909000 audit[5086]: CRED_ACQ pid=5086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:51.909000 audit[5086]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe97d3ccc0 a2=3 a3=0 items=0 ppid=1 pid=5086 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:51.909000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:51.910903 sshd[5086]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:51.916592 systemd[1]: Started session-22.scope. Dec 13 14:31:51.917290 systemd-logind[1194]: New session 22 of user core. Dec 13 14:31:51.922000 audit[5086]: USER_START pid=5086 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:51.926000 audit[5110]: CRED_ACQ pid=5110 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:51.990540 env[1202]: 2024-12-13 14:31:51.953 [INFO][5104] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Dec 13 14:31:51.990540 env[1202]: 2024-12-13 14:31:51.953 [INFO][5104] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" iface="eth0" netns="/var/run/netns/cni-6eb9aea6-c8ed-48d3-1fe9-318c1181e317" Dec 13 14:31:51.990540 env[1202]: 2024-12-13 14:31:51.953 [INFO][5104] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" iface="eth0" netns="/var/run/netns/cni-6eb9aea6-c8ed-48d3-1fe9-318c1181e317" Dec 13 14:31:51.990540 env[1202]: 2024-12-13 14:31:51.954 [INFO][5104] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" iface="eth0" netns="/var/run/netns/cni-6eb9aea6-c8ed-48d3-1fe9-318c1181e317" Dec 13 14:31:51.990540 env[1202]: 2024-12-13 14:31:51.954 [INFO][5104] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Dec 13 14:31:51.990540 env[1202]: 2024-12-13 14:31:51.954 [INFO][5104] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Dec 13 14:31:51.990540 env[1202]: 2024-12-13 14:31:51.976 [INFO][5112] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" HandleID="k8s-pod-network.fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Workload="localhost-k8s-csi--node--driver--2zzf8-eth0" Dec 13 14:31:51.990540 env[1202]: 2024-12-13 14:31:51.977 [INFO][5112] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:51.990540 env[1202]: 2024-12-13 14:31:51.977 [INFO][5112] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:51.990540 env[1202]: 2024-12-13 14:31:51.985 [WARNING][5112] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" HandleID="k8s-pod-network.fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Workload="localhost-k8s-csi--node--driver--2zzf8-eth0" Dec 13 14:31:51.990540 env[1202]: 2024-12-13 14:31:51.985 [INFO][5112] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" HandleID="k8s-pod-network.fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Workload="localhost-k8s-csi--node--driver--2zzf8-eth0" Dec 13 14:31:51.990540 env[1202]: 2024-12-13 14:31:51.986 [INFO][5112] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:51.990540 env[1202]: 2024-12-13 14:31:51.988 [INFO][5104] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Dec 13 14:31:52.000644 env[1202]: time="2024-12-13T14:31:51.994117064Z" level=info msg="TearDown network for sandbox \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\" successfully" Dec 13 14:31:52.000644 env[1202]: time="2024-12-13T14:31:51.994165136Z" level=info msg="StopPodSandbox for \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\" returns successfully" Dec 13 14:31:52.000644 env[1202]: time="2024-12-13T14:31:51.994832507Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2zzf8,Uid:70b747ec-d344-4421-ac6c-6b613f04fea5,Namespace:calico-system,Attempt:1,}" Dec 13 14:31:51.993247 systemd[1]: run-netns-cni\x2d6eb9aea6\x2dc8ed\x2d48d3\x2d1fe9\x2d318c1181e317.mount: Deactivated successfully. Dec 13 14:31:52.189428 systemd-networkd[1025]: cali6d039146e55: Link UP Dec 13 14:31:52.193044 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:31:52.193211 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6d039146e55: link becomes ready Dec 13 14:31:52.193171 systemd-networkd[1025]: cali6d039146e55: Gained carrier Dec 13 14:31:52.204974 env[1202]: 2024-12-13 14:31:52.085 [INFO][5126] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--2zzf8-eth0 csi-node-driver- calico-system 70b747ec-d344-4421-ac6c-6b613f04fea5 1188 0 2024-12-13 14:30:39 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-2zzf8 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali6d039146e55 [] []}} ContainerID="4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee" Namespace="calico-system" Pod="csi-node-driver-2zzf8" WorkloadEndpoint="localhost-k8s-csi--node--driver--2zzf8-" Dec 13 14:31:52.204974 env[1202]: 2024-12-13 14:31:52.085 [INFO][5126] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee" Namespace="calico-system" Pod="csi-node-driver-2zzf8" WorkloadEndpoint="localhost-k8s-csi--node--driver--2zzf8-eth0" Dec 13 14:31:52.204974 env[1202]: 2024-12-13 14:31:52.122 [INFO][5139] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee" HandleID="k8s-pod-network.4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee" Workload="localhost-k8s-csi--node--driver--2zzf8-eth0" Dec 13 14:31:52.204974 env[1202]: 2024-12-13 14:31:52.137 [INFO][5139] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee" HandleID="k8s-pod-network.4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee" Workload="localhost-k8s-csi--node--driver--2zzf8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001fd500), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-2zzf8", "timestamp":"2024-12-13 14:31:52.122444893 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:31:52.204974 env[1202]: 2024-12-13 14:31:52.137 [INFO][5139] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:52.204974 env[1202]: 2024-12-13 14:31:52.137 [INFO][5139] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:52.204974 env[1202]: 2024-12-13 14:31:52.137 [INFO][5139] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:31:52.204974 env[1202]: 2024-12-13 14:31:52.139 [INFO][5139] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee" host="localhost" Dec 13 14:31:52.204974 env[1202]: 2024-12-13 14:31:52.146 [INFO][5139] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:31:52.204974 env[1202]: 2024-12-13 14:31:52.156 [INFO][5139] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:31:52.204974 env[1202]: 2024-12-13 14:31:52.169 [INFO][5139] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:31:52.204974 env[1202]: 2024-12-13 14:31:52.171 [INFO][5139] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:31:52.204974 env[1202]: 2024-12-13 14:31:52.171 [INFO][5139] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee" host="localhost" Dec 13 14:31:52.204974 env[1202]: 2024-12-13 14:31:52.172 [INFO][5139] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee Dec 13 14:31:52.204974 env[1202]: 2024-12-13 14:31:52.178 [INFO][5139] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee" host="localhost" Dec 13 14:31:52.204974 env[1202]: 2024-12-13 14:31:52.184 [INFO][5139] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee" host="localhost" Dec 13 14:31:52.204974 env[1202]: 2024-12-13 14:31:52.184 [INFO][5139] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee" host="localhost" Dec 13 14:31:52.204974 env[1202]: 2024-12-13 14:31:52.184 [INFO][5139] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:52.204974 env[1202]: 2024-12-13 14:31:52.184 [INFO][5139] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee" HandleID="k8s-pod-network.4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee" Workload="localhost-k8s-csi--node--driver--2zzf8-eth0" Dec 13 14:31:52.205640 env[1202]: 2024-12-13 14:31:52.187 [INFO][5126] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee" Namespace="calico-system" Pod="csi-node-driver-2zzf8" WorkloadEndpoint="localhost-k8s-csi--node--driver--2zzf8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--2zzf8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"70b747ec-d344-4421-ac6c-6b613f04fea5", ResourceVersion:"1188", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-2zzf8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6d039146e55", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:52.205640 env[1202]: 2024-12-13 14:31:52.187 [INFO][5126] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee" Namespace="calico-system" Pod="csi-node-driver-2zzf8" WorkloadEndpoint="localhost-k8s-csi--node--driver--2zzf8-eth0" Dec 13 14:31:52.205640 env[1202]: 2024-12-13 14:31:52.187 [INFO][5126] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6d039146e55 ContainerID="4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee" Namespace="calico-system" Pod="csi-node-driver-2zzf8" WorkloadEndpoint="localhost-k8s-csi--node--driver--2zzf8-eth0" Dec 13 14:31:52.205640 env[1202]: 2024-12-13 14:31:52.189 [INFO][5126] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee" Namespace="calico-system" Pod="csi-node-driver-2zzf8" WorkloadEndpoint="localhost-k8s-csi--node--driver--2zzf8-eth0" Dec 13 14:31:52.205640 env[1202]: 2024-12-13 14:31:52.193 [INFO][5126] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee" Namespace="calico-system" Pod="csi-node-driver-2zzf8" WorkloadEndpoint="localhost-k8s-csi--node--driver--2zzf8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--2zzf8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"70b747ec-d344-4421-ac6c-6b613f04fea5", ResourceVersion:"1188", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee", Pod:"csi-node-driver-2zzf8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6d039146e55", MAC:"da:a5:ad:71:b1:2c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:52.205640 env[1202]: 2024-12-13 14:31:52.202 [INFO][5126] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee" Namespace="calico-system" Pod="csi-node-driver-2zzf8" WorkloadEndpoint="localhost-k8s-csi--node--driver--2zzf8-eth0" Dec 13 14:31:52.220886 env[1202]: time="2024-12-13T14:31:52.220786220Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:52.220886 env[1202]: time="2024-12-13T14:31:52.220831286Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:52.220886 env[1202]: time="2024-12-13T14:31:52.220858227Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:52.221142 env[1202]: time="2024-12-13T14:31:52.221068087Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee pid=5166 runtime=io.containerd.runc.v2 Dec 13 14:31:52.230000 audit[5177]: NETFILTER_CFG table=filter:116 family=2 entries=50 op=nft_register_chain pid=5177 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:52.230000 audit[5177]: SYSCALL arch=c000003e syscall=46 success=yes exit=23392 a0=3 a1=7ffd3c1afcd0 a2=0 a3=7ffd3c1afcbc items=0 ppid=4125 pid=5177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.230000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:52.236263 systemd[1]: Started cri-containerd-4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee.scope. Dec 13 14:31:52.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit: BPF prog-id=216 op=LOAD Dec 13 14:31:52.254000 audit[5178]: AVC avc: denied { bpf } for pid=5178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit[5178]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=5166 pid=5178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461666262386239376631616439343232373837396565383963306132 Dec 13 14:31:52.254000 audit[5178]: AVC avc: denied { perfmon } for pid=5178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit[5178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=5166 pid=5178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461666262386239376631616439343232373837396565383963306132 Dec 13 14:31:52.254000 audit[5178]: AVC avc: denied { bpf } for pid=5178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit[5178]: AVC avc: denied { bpf } for pid=5178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit[5178]: AVC avc: denied { bpf } for pid=5178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit[5178]: AVC avc: denied { perfmon } for pid=5178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit[5178]: AVC avc: denied { perfmon } for pid=5178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit[5178]: AVC avc: denied { perfmon } for pid=5178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit[5178]: AVC avc: denied { perfmon } for pid=5178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit[5178]: AVC avc: denied { perfmon } for pid=5178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit[5178]: AVC avc: denied { bpf } for pid=5178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit[5178]: AVC avc: denied { bpf } for pid=5178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.254000 audit: BPF prog-id=217 op=LOAD Dec 13 14:31:52.254000 audit[5178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000275d90 items=0 ppid=5166 pid=5178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461666262386239376631616439343232373837396565383963306132 Dec 13 14:31:52.255000 audit[5178]: AVC avc: denied { bpf } for pid=5178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.255000 audit[5178]: AVC avc: denied { bpf } for pid=5178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.255000 audit[5178]: AVC avc: denied { perfmon } for pid=5178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.255000 audit[5178]: AVC avc: denied { perfmon } for pid=5178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.255000 audit[5178]: AVC avc: denied { perfmon } for pid=5178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.255000 audit[5178]: AVC avc: denied { perfmon } for pid=5178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.255000 audit[5178]: AVC avc: denied { perfmon } for pid=5178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.255000 audit[5178]: AVC avc: denied { bpf } for pid=5178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.255000 audit[5178]: AVC avc: denied { bpf } for pid=5178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.255000 audit: BPF prog-id=218 op=LOAD Dec 13 14:31:52.255000 audit[5178]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000275dd8 items=0 ppid=5166 pid=5178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461666262386239376631616439343232373837396565383963306132 Dec 13 14:31:52.255000 audit: BPF prog-id=218 op=UNLOAD Dec 13 14:31:52.255000 audit: BPF prog-id=217 op=UNLOAD Dec 13 14:31:52.255000 audit[5178]: AVC avc: denied { bpf } for pid=5178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.255000 audit[5178]: AVC avc: denied { bpf } for pid=5178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.255000 audit[5178]: AVC avc: denied { bpf } for pid=5178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.255000 audit[5178]: AVC avc: denied { perfmon } for pid=5178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.255000 audit[5178]: AVC avc: denied { perfmon } for pid=5178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.255000 audit[5178]: AVC avc: denied { perfmon } for pid=5178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.255000 audit[5178]: AVC avc: denied { perfmon } for pid=5178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.255000 audit[5178]: AVC avc: denied { perfmon } for pid=5178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.255000 audit[5178]: AVC avc: denied { bpf } for pid=5178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.255000 audit[5178]: AVC avc: denied { bpf } for pid=5178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.255000 audit: BPF prog-id=219 op=LOAD Dec 13 14:31:52.255000 audit[5178]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003501e8 items=0 ppid=5166 pid=5178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461666262386239376631616439343232373837396565383963306132 Dec 13 14:31:52.257031 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:31:52.267658 env[1202]: time="2024-12-13T14:31:52.267623111Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2zzf8,Uid:70b747ec-d344-4421-ac6c-6b613f04fea5,Namespace:calico-system,Attempt:1,} returns sandbox id \"4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee\"" Dec 13 14:31:52.291201 sshd[5086]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:52.291000 audit[5086]: USER_END pid=5086 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:52.291000 audit[5086]: CRED_DISP pid=5086 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:52.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.133:22-10.0.0.1:34540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:52.294466 systemd[1]: Started sshd@22-10.0.0.133:22-10.0.0.1:34540.service. Dec 13 14:31:52.295467 systemd[1]: sshd@21-10.0.0.133:22-10.0.0.1:34534.service: Deactivated successfully. Dec 13 14:31:52.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.133:22-10.0.0.1:34534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:52.296045 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:31:52.296795 systemd-logind[1194]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:31:52.297691 systemd-logind[1194]: Removed session 22. Dec 13 14:31:52.317047 systemd-networkd[1025]: cali372940160e7: Gained IPv6LL Dec 13 14:31:52.333000 audit[5202]: USER_ACCT pid=5202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:52.334118 sshd[5202]: Accepted publickey for core from 10.0.0.1 port 34540 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:31:52.334000 audit[5202]: CRED_ACQ pid=5202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:52.334000 audit[5202]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7acf46c0 a2=3 a3=0 items=0 ppid=1 pid=5202 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.334000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:52.335347 sshd[5202]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:52.339779 systemd-logind[1194]: New session 23 of user core. Dec 13 14:31:52.340503 systemd[1]: Started session-23.scope. Dec 13 14:31:52.354000 audit[5202]: USER_START pid=5202 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:52.355000 audit[5205]: CRED_ACQ pid=5205 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:52.400000 audit[5050]: AVC avc: denied { watch } for pid=5050 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_30_54.2302093627/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c466,c901 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c466,c901 tclass=file permissive=0 Dec 13 14:31:52.400000 audit[5050]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0010a9be0 a2=fc6 a3=0 items=0 ppid=4999 pid=5050 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c466,c901 key=(null) Dec 13 14:31:52.400000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:31:52.700050 systemd-networkd[1025]: calid558e44b280: Gained IPv6LL Dec 13 14:31:52.699000 audit[5214]: NETFILTER_CFG table=filter:117 family=2 entries=8 op=nft_register_rule pid=5214 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:52.699000 audit[5214]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffee3536dd0 a2=0 a3=7ffee3536dbc items=0 ppid=2085 pid=5214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.699000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:52.704000 audit[5214]: NETFILTER_CFG table=nat:118 family=2 entries=34 op=nft_register_chain pid=5214 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:52.704000 audit[5214]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffee3536dd0 a2=0 a3=7ffee3536dbc items=0 ppid=2085 pid=5214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.704000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:52.891619 kubelet[1936]: E1213 14:31:52.891528 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:31:54.172013 systemd-networkd[1025]: cali6d039146e55: Gained IPv6LL Dec 13 14:31:54.656241 env[1202]: time="2024-12-13T14:31:54.656178181Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:54.673327 env[1202]: time="2024-12-13T14:31:54.673270451Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:54.681192 env[1202]: time="2024-12-13T14:31:54.681140511Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:54.687871 env[1202]: time="2024-12-13T14:31:54.687807191Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:54.688589 env[1202]: time="2024-12-13T14:31:54.688530417Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 14:31:54.690295 env[1202]: time="2024-12-13T14:31:54.690162972Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:31:54.699252 env[1202]: time="2024-12-13T14:31:54.699196835Z" level=info msg="CreateContainer within sandbox \"31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:31:54.702000 audit[5227]: NETFILTER_CFG table=filter:119 family=2 entries=20 op=nft_register_rule pid=5227 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:54.702000 audit[5227]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe84229900 a2=0 a3=7ffe842298ec items=0 ppid=2085 pid=5227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.702000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:54.706283 sshd[5202]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:54.706000 audit[5202]: USER_END pid=5202 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:54.707000 audit[5202]: CRED_DISP pid=5202 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:54.710547 systemd[1]: sshd@22-10.0.0.133:22-10.0.0.1:34540.service: Deactivated successfully. Dec 13 14:31:54.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.133:22-10.0.0.1:34540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.709000 audit[5227]: NETFILTER_CFG table=nat:120 family=2 entries=22 op=nft_register_rule pid=5227 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:54.709000 audit[5227]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe84229900 a2=0 a3=0 items=0 ppid=2085 pid=5227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.709000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:54.711416 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:31:54.712441 systemd-logind[1194]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:31:54.714737 systemd[1]: Started sshd@23-10.0.0.133:22-10.0.0.1:34550.service. Dec 13 14:31:54.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.133:22-10.0.0.1:34550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:54.719316 env[1202]: time="2024-12-13T14:31:54.719272290Z" level=info msg="CreateContainer within sandbox \"31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"f9b4f881b56e5f40e9e9a4299120493ee87119fb0313db1d36c0ba2354fbcdd4\"" Dec 13 14:31:54.720218 env[1202]: time="2024-12-13T14:31:54.720193372Z" level=info msg="StartContainer for \"f9b4f881b56e5f40e9e9a4299120493ee87119fb0313db1d36c0ba2354fbcdd4\"" Dec 13 14:31:54.725472 systemd-logind[1194]: Removed session 23. Dec 13 14:31:54.734000 audit[5242]: NETFILTER_CFG table=filter:121 family=2 entries=32 op=nft_register_rule pid=5242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:54.734000 audit[5242]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc934b5b20 a2=0 a3=7ffc934b5b0c items=0 ppid=2085 pid=5242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.734000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:54.744000 audit[5242]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5242 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:54.744000 audit[5242]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc934b5b20 a2=0 a3=0 items=0 ppid=2085 pid=5242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.744000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:54.748956 systemd[1]: Started cri-containerd-f9b4f881b56e5f40e9e9a4299120493ee87119fb0313db1d36c0ba2354fbcdd4.scope. Dec 13 14:31:54.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.766000 audit: BPF prog-id=220 op=LOAD Dec 13 14:31:54.767000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.767000 audit[5243]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4884 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623466383831623536653566343065396539613432393931323034 Dec 13 14:31:54.768000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.768000 audit[5243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4884 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623466383831623536653566343065396539613432393931323034 Dec 13 14:31:54.768000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.768000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.768000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.768000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.768000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.768000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.768000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.768000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.768000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.768000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.768000 audit: BPF prog-id=221 op=LOAD Dec 13 14:31:54.768000 audit[5243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d62a0 items=0 ppid=4884 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623466383831623536653566343065396539613432393931323034 Dec 13 14:31:54.769000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.769000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.769000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.769000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.769000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.769000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.769000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.769000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.770000 audit[5232]: USER_ACCT pid=5232 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:54.771161 sshd[5232]: Accepted publickey for core from 10.0.0.1 port 34550 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:31:54.769000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.769000 audit: BPF prog-id=222 op=LOAD Dec 13 14:31:54.769000 audit[5243]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d62e8 items=0 ppid=4884 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623466383831623536653566343065396539613432393931323034 Dec 13 14:31:54.770000 audit: BPF prog-id=222 op=UNLOAD Dec 13 14:31:54.771000 audit[5232]: CRED_ACQ pid=5232 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:54.771000 audit[5232]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4d95d740 a2=3 a3=0 items=0 ppid=1 pid=5232 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.771000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:54.772242 sshd[5232]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:54.771000 audit: BPF prog-id=221 op=UNLOAD Dec 13 14:31:54.771000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.771000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.771000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.771000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.771000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.771000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.771000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.771000 audit[5243]: AVC avc: denied { perfmon } for pid=5243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.771000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.771000 audit[5243]: AVC avc: denied { bpf } for pid=5243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.771000 audit: BPF prog-id=223 op=LOAD Dec 13 14:31:54.771000 audit[5243]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d66f8 items=0 ppid=4884 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639623466383831623536653566343065396539613432393931323034 Dec 13 14:31:54.776435 systemd-logind[1194]: New session 24 of user core. Dec 13 14:31:54.777620 systemd[1]: Started session-24.scope. Dec 13 14:31:54.780000 audit[5232]: USER_START pid=5232 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:54.782000 audit[5260]: CRED_ACQ pid=5260 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:54.807896 env[1202]: time="2024-12-13T14:31:54.807804484Z" level=info msg="StartContainer for \"f9b4f881b56e5f40e9e9a4299120493ee87119fb0313db1d36c0ba2354fbcdd4\" returns successfully" Dec 13 14:31:55.360553 sshd[5232]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:55.360000 audit[5232]: USER_END pid=5232 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:55.360000 audit[5232]: CRED_DISP pid=5232 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:55.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.133:22-10.0.0.1:34550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:55.363931 systemd[1]: sshd@23-10.0.0.133:22-10.0.0.1:34550.service: Deactivated successfully. Dec 13 14:31:55.364467 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:31:55.365165 systemd-logind[1194]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:31:55.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.133:22-10.0.0.1:34558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:55.366613 systemd[1]: Started sshd@24-10.0.0.133:22-10.0.0.1:34558.service. Dec 13 14:31:55.367733 systemd-logind[1194]: Removed session 24. Dec 13 14:31:55.405000 audit[5281]: USER_ACCT pid=5281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:55.407011 sshd[5281]: Accepted publickey for core from 10.0.0.1 port 34558 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:31:55.406000 audit[5281]: CRED_ACQ pid=5281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:55.406000 audit[5281]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe14ebfbf0 a2=3 a3=0 items=0 ppid=1 pid=5281 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:55.406000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:55.407895 sshd[5281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:55.412608 systemd-logind[1194]: New session 25 of user core. Dec 13 14:31:55.413444 systemd[1]: Started session-25.scope. Dec 13 14:31:55.419000 audit[5281]: USER_START pid=5281 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:55.420000 audit[5283]: CRED_ACQ pid=5283 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:55.527417 sshd[5281]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:55.527000 audit[5281]: USER_END pid=5281 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:55.527000 audit[5281]: CRED_DISP pid=5281 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:31:55.529944 systemd[1]: sshd@24-10.0.0.133:22-10.0.0.1:34558.service: Deactivated successfully. Dec 13 14:31:55.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.133:22-10.0.0.1:34558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:55.530731 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:31:55.531515 systemd-logind[1194]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:31:55.532185 systemd-logind[1194]: Removed session 25. Dec 13 14:31:55.695274 systemd[1]: run-containerd-runc-k8s.io-f9b4f881b56e5f40e9e9a4299120493ee87119fb0313db1d36c0ba2354fbcdd4-runc.iJuZEY.mount: Deactivated successfully. Dec 13 14:31:55.702438 kubelet[1936]: I1213 14:31:55.701880 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-856cb6d94c-5hc9r" podStartSLOduration=72.499035996 podStartE2EDuration="1m16.701830952s" podCreationTimestamp="2024-12-13 14:30:39 +0000 UTC" firstStartedPulling="2024-12-13 14:31:50.487173195 +0000 UTC m=+88.680960738" lastFinishedPulling="2024-12-13 14:31:54.689968151 +0000 UTC m=+92.883755694" observedRunningTime="2024-12-13 14:31:55.698552259 +0000 UTC m=+93.892339832" watchObservedRunningTime="2024-12-13 14:31:55.701830952 +0000 UTC m=+93.895618626" Dec 13 14:31:56.357677 env[1202]: time="2024-12-13T14:31:56.357614543Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:56.359369 env[1202]: time="2024-12-13T14:31:56.359330694Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:56.361369 env[1202]: time="2024-12-13T14:31:56.361341266Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:56.362627 env[1202]: time="2024-12-13T14:31:56.362598096Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:56.363051 env[1202]: time="2024-12-13T14:31:56.363024656Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:31:56.364761 env[1202]: time="2024-12-13T14:31:56.364725529Z" level=info msg="CreateContainer within sandbox \"4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:31:56.380740 env[1202]: time="2024-12-13T14:31:56.380691527Z" level=info msg="CreateContainer within sandbox \"4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"8c00691ac119710589bceb936941641025c677d22a2c4bc0074b04655fca1048\"" Dec 13 14:31:56.381161 env[1202]: time="2024-12-13T14:31:56.381137465Z" level=info msg="StartContainer for \"8c00691ac119710589bceb936941641025c677d22a2c4bc0074b04655fca1048\"" Dec 13 14:31:56.400517 systemd[1]: Started cri-containerd-8c00691ac119710589bceb936941641025c677d22a2c4bc0074b04655fca1048.scope. Dec 13 14:31:56.412000 audit[5322]: AVC avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.414394 kernel: kauditd_printk_skb: 246 callbacks suppressed Dec 13 14:31:56.414468 kernel: audit: type=1400 audit(1734100316.412:1557): avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.412000 audit[5322]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f835c48b2f8 items=0 ppid=5166 pid=5322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.422499 kernel: audit: type=1300 audit(1734100316.412:1557): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f835c48b2f8 items=0 ppid=5166 pid=5322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.422555 kernel: audit: type=1327 audit(1734100316.412:1557): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863303036393161633131393731303538396263656239333639343136 Dec 13 14:31:56.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863303036393161633131393731303538396263656239333639343136 Dec 13 14:31:56.412000 audit[5322]: AVC avc: denied { bpf } for pid=5322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.412000 audit[5322]: AVC avc: denied { bpf } for pid=5322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.432957 kernel: audit: type=1400 audit(1734100316.412:1558): avc: denied { bpf } for pid=5322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.433023 kernel: audit: type=1400 audit(1734100316.412:1558): avc: denied { bpf } for pid=5322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.436491 kernel: audit: type=1400 audit(1734100316.412:1558): avc: denied { bpf } for pid=5322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.412000 audit[5322]: AVC avc: denied { bpf } for pid=5322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.412000 audit[5322]: AVC avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.440273 kernel: audit: type=1400 audit(1734100316.412:1558): avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.440337 kernel: audit: type=1400 audit(1734100316.412:1558): avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.412000 audit[5322]: AVC avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.412000 audit[5322]: AVC avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.447257 kernel: audit: type=1400 audit(1734100316.412:1558): avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.412000 audit[5322]: AVC avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.450945 kernel: audit: type=1400 audit(1734100316.412:1558): avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.412000 audit[5322]: AVC avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.412000 audit[5322]: AVC avc: denied { bpf } for pid=5322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.412000 audit[5322]: AVC avc: denied { bpf } for pid=5322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.412000 audit: BPF prog-id=224 op=LOAD Dec 13 14:31:56.412000 audit[5322]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024ae8 items=0 ppid=5166 pid=5322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863303036393161633131393731303538396263656239333639343136 Dec 13 14:31:56.413000 audit[5322]: AVC avc: denied { bpf } for pid=5322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.413000 audit[5322]: AVC avc: denied { bpf } for pid=5322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.413000 audit[5322]: AVC avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.413000 audit[5322]: AVC avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.413000 audit[5322]: AVC avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.413000 audit[5322]: AVC avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.413000 audit[5322]: AVC avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.413000 audit[5322]: AVC avc: denied { bpf } for pid=5322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.413000 audit[5322]: AVC avc: denied { bpf } for pid=5322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.413000 audit: BPF prog-id=225 op=LOAD Dec 13 14:31:56.413000 audit[5322]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024b38 items=0 ppid=5166 pid=5322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863303036393161633131393731303538396263656239333639343136 Dec 13 14:31:56.416000 audit: BPF prog-id=225 op=UNLOAD Dec 13 14:31:56.416000 audit: BPF prog-id=224 op=UNLOAD Dec 13 14:31:56.416000 audit[5322]: AVC avc: denied { bpf } for pid=5322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.416000 audit[5322]: AVC avc: denied { bpf } for pid=5322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.416000 audit[5322]: AVC avc: denied { bpf } for pid=5322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.416000 audit[5322]: AVC avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.416000 audit[5322]: AVC avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.416000 audit[5322]: AVC avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.416000 audit[5322]: AVC avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.416000 audit[5322]: AVC avc: denied { perfmon } for pid=5322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.416000 audit[5322]: AVC avc: denied { bpf } for pid=5322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.416000 audit[5322]: AVC avc: denied { bpf } for pid=5322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.416000 audit: BPF prog-id=226 op=LOAD Dec 13 14:31:56.416000 audit[5322]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024bc8 items=0 ppid=5166 pid=5322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863303036393161633131393731303538396263656239333639343136 Dec 13 14:31:56.453180 env[1202]: time="2024-12-13T14:31:56.452439995Z" level=info msg="StartContainer for \"8c00691ac119710589bceb936941641025c677d22a2c4bc0074b04655fca1048\" returns successfully" Dec 13 14:31:56.453551 env[1202]: time="2024-12-13T14:31:56.453525087Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:31:58.382238 env[1202]: time="2024-12-13T14:31:58.382179221Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:58.457856 env[1202]: time="2024-12-13T14:31:58.457792032Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:58.493853 env[1202]: time="2024-12-13T14:31:58.493805433Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:58.521234 env[1202]: time="2024-12-13T14:31:58.521189280Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:58.521709 env[1202]: time="2024-12-13T14:31:58.521674993Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:31:58.523298 env[1202]: time="2024-12-13T14:31:58.523273169Z" level=info msg="CreateContainer within sandbox \"4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:31:58.549701 env[1202]: time="2024-12-13T14:31:58.549647830Z" level=info msg="CreateContainer within sandbox \"4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"218eb4583bc9ea49ff440bc7a315703e2b3679f3b726fb6701f8f31cc61ca39e\"" Dec 13 14:31:58.551928 env[1202]: time="2024-12-13T14:31:58.551142819Z" level=info msg="StartContainer for \"218eb4583bc9ea49ff440bc7a315703e2b3679f3b726fb6701f8f31cc61ca39e\"" Dec 13 14:31:58.573160 systemd[1]: Started cri-containerd-218eb4583bc9ea49ff440bc7a315703e2b3679f3b726fb6701f8f31cc61ca39e.scope. Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { perfmon } for pid=5360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit[5360]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f9fcc517a88 items=0 ppid=5166 pid=5360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:58.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231386562343538336263396561343966663434306263376133313537 Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { bpf } for pid=5360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { bpf } for pid=5360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { bpf } for pid=5360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { perfmon } for pid=5360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { perfmon } for pid=5360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { perfmon } for pid=5360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { perfmon } for pid=5360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { perfmon } for pid=5360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { bpf } for pid=5360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { bpf } for pid=5360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit: BPF prog-id=227 op=LOAD Dec 13 14:31:58.588000 audit[5360]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000292fa8 items=0 ppid=5166 pid=5360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:58.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231386562343538336263396561343966663434306263376133313537 Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { bpf } for pid=5360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { bpf } for pid=5360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { perfmon } for pid=5360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { perfmon } for pid=5360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { perfmon } for pid=5360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { perfmon } for pid=5360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { perfmon } for pid=5360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { bpf } for pid=5360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit[5360]: AVC avc: denied { bpf } for pid=5360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.588000 audit: BPF prog-id=228 op=LOAD Dec 13 14:31:58.588000 audit[5360]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000292ff8 items=0 ppid=5166 pid=5360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:58.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231386562343538336263396561343966663434306263376133313537 Dec 13 14:31:58.589000 audit: BPF prog-id=228 op=UNLOAD Dec 13 14:31:58.589000 audit: BPF prog-id=227 op=UNLOAD Dec 13 14:31:58.589000 audit[5360]: AVC avc: denied { bpf } for pid=5360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.589000 audit[5360]: AVC avc: denied { bpf } for pid=5360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.589000 audit[5360]: AVC avc: denied { bpf } for pid=5360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.589000 audit[5360]: AVC avc: denied { perfmon } for pid=5360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.589000 audit[5360]: AVC avc: denied { perfmon } for pid=5360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.589000 audit[5360]: AVC avc: denied { perfmon } for pid=5360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.589000 audit[5360]: AVC avc: denied { perfmon } for pid=5360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.589000 audit[5360]: AVC avc: denied { perfmon } for pid=5360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.589000 audit[5360]: AVC avc: denied { bpf } for pid=5360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.589000 audit[5360]: AVC avc: denied { bpf } for pid=5360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.589000 audit: BPF prog-id=229 op=LOAD Dec 13 14:31:58.589000 audit[5360]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000293088 items=0 ppid=5166 pid=5360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:58.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231386562343538336263396561343966663434306263376133313537 Dec 13 14:31:58.647303 env[1202]: time="2024-12-13T14:31:58.647208303Z" level=info msg="StartContainer for \"218eb4583bc9ea49ff440bc7a315703e2b3679f3b726fb6701f8f31cc61ca39e\" returns successfully" Dec 13 14:31:58.699484 kubelet[1936]: I1213 14:31:58.699177 1936 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-2zzf8" podStartSLOduration=73.445806468 podStartE2EDuration="1m19.699158446s" podCreationTimestamp="2024-12-13 14:30:39 +0000 UTC" firstStartedPulling="2024-12-13 14:31:52.268965406 +0000 UTC m=+90.462752939" lastFinishedPulling="2024-12-13 14:31:58.522317373 +0000 UTC m=+96.716104917" observedRunningTime="2024-12-13 14:31:58.698717307 +0000 UTC m=+96.892504850" watchObservedRunningTime="2024-12-13 14:31:58.699158446 +0000 UTC m=+96.892945989" Dec 13 14:31:59.003070 kubelet[1936]: I1213 14:31:59.002937 1936 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:31:59.003070 kubelet[1936]: I1213 14:31:59.002974 1936 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:32:00.531437 systemd[1]: Started sshd@25-10.0.0.133:22-10.0.0.1:46806.service. Dec 13 14:32:00.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.133:22-10.0.0.1:46806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:00.569000 audit[5394]: USER_ACCT pid=5394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:00.570305 sshd[5394]: Accepted publickey for core from 10.0.0.1 port 46806 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:32:00.570000 audit[5394]: CRED_ACQ pid=5394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:00.570000 audit[5394]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff86328390 a2=3 a3=0 items=0 ppid=1 pid=5394 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.570000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:00.571342 sshd[5394]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:00.574606 systemd-logind[1194]: New session 26 of user core. Dec 13 14:32:00.575351 systemd[1]: Started session-26.scope. Dec 13 14:32:00.579000 audit[5394]: USER_START pid=5394 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:00.580000 audit[5396]: CRED_ACQ pid=5396 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:00.705179 sshd[5394]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:00.705000 audit[5394]: USER_END pid=5394 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:00.705000 audit[5394]: CRED_DISP pid=5394 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:00.707692 systemd[1]: sshd@25-10.0.0.133:22-10.0.0.1:46806.service: Deactivated successfully. Dec 13 14:32:00.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.133:22-10.0.0.1:46806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:00.708567 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 14:32:00.709195 systemd-logind[1194]: Session 26 logged out. Waiting for processes to exit. Dec 13 14:32:00.709947 systemd-logind[1194]: Removed session 26. Dec 13 14:32:01.299000 audit[5407]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=5407 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:01.299000 audit[5407]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff4b202940 a2=0 a3=7fff4b20292c items=0 ppid=2085 pid=5407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.299000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:01.307000 audit[5407]: NETFILTER_CFG table=nat:124 family=2 entries=106 op=nft_register_chain pid=5407 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:01.307000 audit[5407]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff4b202940 a2=0 a3=7fff4b20292c items=0 ppid=2085 pid=5407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.307000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:02.891025 kubelet[1936]: E1213 14:32:02.890984 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:32:05.709095 systemd[1]: Started sshd@26-10.0.0.133:22-10.0.0.1:46816.service. Dec 13 14:32:05.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.133:22-10.0.0.1:46816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:05.710530 kernel: kauditd_printk_skb: 93 callbacks suppressed Dec 13 14:32:05.710597 kernel: audit: type=1130 audit(1734100325.708:1580): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.133:22-10.0.0.1:46816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:05.744000 audit[5420]: USER_ACCT pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:05.745278 sshd[5420]: Accepted publickey for core from 10.0.0.1 port 46816 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:32:05.747150 sshd[5420]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:05.746000 audit[5420]: CRED_ACQ pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:05.750853 systemd-logind[1194]: New session 27 of user core. Dec 13 14:32:05.751828 systemd[1]: Started session-27.scope. Dec 13 14:32:05.754077 kernel: audit: type=1101 audit(1734100325.744:1581): pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:05.754138 kernel: audit: type=1103 audit(1734100325.746:1582): pid=5420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:05.754173 kernel: audit: type=1006 audit(1734100325.746:1583): pid=5420 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 14:32:05.746000 audit[5420]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc94c58570 a2=3 a3=0 items=0 ppid=1 pid=5420 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:05.761207 kernel: audit: type=1300 audit(1734100325.746:1583): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc94c58570 a2=3 a3=0 items=0 ppid=1 pid=5420 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:05.761268 kernel: audit: type=1327 audit(1734100325.746:1583): proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:05.746000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:05.755000 audit[5420]: USER_START pid=5420 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:05.766833 kernel: audit: type=1105 audit(1734100325.755:1584): pid=5420 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:05.766898 kernel: audit: type=1103 audit(1734100325.756:1585): pid=5422 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:05.756000 audit[5422]: CRED_ACQ pid=5422 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:05.862140 sshd[5420]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:05.862000 audit[5420]: USER_END pid=5420 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:05.864026 systemd[1]: sshd@26-10.0.0.133:22-10.0.0.1:46816.service: Deactivated successfully. Dec 13 14:32:05.864881 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 14:32:05.865391 systemd-logind[1194]: Session 27 logged out. Waiting for processes to exit. Dec 13 14:32:05.866121 systemd-logind[1194]: Removed session 27. Dec 13 14:32:05.862000 audit[5420]: CRED_DISP pid=5420 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:05.870549 kernel: audit: type=1106 audit(1734100325.862:1586): pid=5420 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:05.870702 kernel: audit: type=1104 audit(1734100325.862:1587): pid=5420 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:05.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.133:22-10.0.0.1:46816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:09.915143 kubelet[1936]: E1213 14:32:09.915106 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:32:10.866803 systemd[1]: Started sshd@27-10.0.0.133:22-10.0.0.1:39352.service. Dec 13 14:32:10.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.133:22-10.0.0.1:39352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:10.868237 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:32:10.868390 kernel: audit: type=1130 audit(1734100330.866:1589): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.133:22-10.0.0.1:39352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:10.905000 audit[5454]: USER_ACCT pid=5454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:10.906827 sshd[5454]: Accepted publickey for core from 10.0.0.1 port 39352 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:32:10.910038 sshd[5454]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:10.908000 audit[5454]: CRED_ACQ pid=5454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:10.914242 kernel: audit: type=1101 audit(1734100330.905:1590): pid=5454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:10.914496 kernel: audit: type=1103 audit(1734100330.908:1591): pid=5454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:10.914519 kernel: audit: type=1006 audit(1734100330.908:1592): pid=5454 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Dec 13 14:32:10.914673 systemd[1]: Started session-28.scope. Dec 13 14:32:10.915011 systemd-logind[1194]: New session 28 of user core. Dec 13 14:32:10.908000 audit[5454]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb1a541d0 a2=3 a3=0 items=0 ppid=1 pid=5454 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.920369 kernel: audit: type=1300 audit(1734100330.908:1592): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb1a541d0 a2=3 a3=0 items=0 ppid=1 pid=5454 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.908000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:10.921862 kernel: audit: type=1327 audit(1734100330.908:1592): proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:10.921915 kernel: audit: type=1105 audit(1734100330.918:1593): pid=5454 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:10.918000 audit[5454]: USER_START pid=5454 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:10.926040 kernel: audit: type=1103 audit(1734100330.919:1594): pid=5456 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:10.919000 audit[5456]: CRED_ACQ pid=5456 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:11.060064 sshd[5454]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:11.060000 audit[5454]: USER_END pid=5454 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:11.062510 systemd[1]: sshd@27-10.0.0.133:22-10.0.0.1:39352.service: Deactivated successfully. Dec 13 14:32:11.063440 systemd[1]: session-28.scope: Deactivated successfully. Dec 13 14:32:11.063961 systemd-logind[1194]: Session 28 logged out. Waiting for processes to exit. Dec 13 14:32:11.064662 systemd-logind[1194]: Removed session 28. Dec 13 14:32:11.060000 audit[5454]: CRED_DISP pid=5454 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:11.068748 kernel: audit: type=1106 audit(1734100331.060:1595): pid=5454 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:11.068821 kernel: audit: type=1104 audit(1734100331.060:1596): pid=5454 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:11.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.133:22-10.0.0.1:39352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:14.891087 kubelet[1936]: E1213 14:32:14.891040 1936 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:32:16.065048 systemd[1]: Started sshd@28-10.0.0.133:22-10.0.0.1:39364.service. Dec 13 14:32:16.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.133:22-10.0.0.1:39364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.066288 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:32:16.066439 kernel: audit: type=1130 audit(1734100336.064:1598): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.133:22-10.0.0.1:39364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:16.101000 audit[5471]: USER_ACCT pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:16.102831 sshd[5471]: Accepted publickey for core from 10.0.0.1 port 39364 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:32:16.105000 audit[5471]: CRED_ACQ pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:16.107214 sshd[5471]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:16.115876 kernel: audit: type=1101 audit(1734100336.101:1599): pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:16.115944 kernel: audit: type=1103 audit(1734100336.105:1600): pid=5471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:16.115971 kernel: audit: type=1006 audit(1734100336.105:1601): pid=5471 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Dec 13 14:32:16.115989 kernel: audit: type=1300 audit(1734100336.105:1601): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffece566a20 a2=3 a3=0 items=0 ppid=1 pid=5471 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.105000 audit[5471]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffece566a20 a2=3 a3=0 items=0 ppid=1 pid=5471 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.111995 systemd[1]: Started session-29.scope. Dec 13 14:32:16.112356 systemd-logind[1194]: New session 29 of user core. Dec 13 14:32:16.105000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:16.118500 kernel: audit: type=1327 audit(1734100336.105:1601): proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:16.118568 kernel: audit: type=1105 audit(1734100336.116:1602): pid=5471 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:16.116000 audit[5471]: USER_START pid=5471 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:16.117000 audit[5475]: CRED_ACQ pid=5475 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:16.126861 kernel: audit: type=1103 audit(1734100336.117:1603): pid=5475 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:16.242094 sshd[5471]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:16.242000 audit[5471]: USER_END pid=5471 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:16.244854 systemd[1]: sshd@28-10.0.0.133:22-10.0.0.1:39364.service: Deactivated successfully. Dec 13 14:32:16.245556 systemd[1]: session-29.scope: Deactivated successfully. Dec 13 14:32:16.246320 systemd-logind[1194]: Session 29 logged out. Waiting for processes to exit. Dec 13 14:32:16.247039 systemd-logind[1194]: Removed session 29. Dec 13 14:32:16.242000 audit[5471]: CRED_DISP pid=5471 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:16.250819 kernel: audit: type=1106 audit(1734100336.242:1604): pid=5471 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:16.250900 kernel: audit: type=1104 audit(1734100336.242:1605): pid=5471 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:16.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.133:22-10.0.0.1:39364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:19.297000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:19.297000 audit[1816]: AVC avc: denied { watch } for pid=1816 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:19.297000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ce7470 a2=fc6 a3=0 items=0 ppid=1674 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 key=(null) Dec 13 14:32:19.297000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:32:19.297000 audit[1816]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00129a360 a2=fc6 a3=0 items=0 ppid=1674 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c271,c285 key=(null) Dec 13 14:32:19.297000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:32:19.583000 audit[1786]: AVC avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:19.583000 audit[1786]: AVC avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:19.583000 audit[1786]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00f21d200 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:32:19.583000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:32:19.583000 audit[1786]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c000f2a690 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:32:19.583000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:32:19.589000 audit[1786]: AVC avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7284 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:19.589000 audit[1786]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c0051261e0 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:32:19.589000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:32:19.589000 audit[1786]: AVC avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7290 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:19.589000 audit[1786]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c007d48a80 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:32:19.589000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:32:19.590000 audit[1786]: AVC avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7286 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:19.590000 audit[1786]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c003633bf0 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:32:19.590000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:32:19.590000 audit[1786]: AVC avc: denied { watch } for pid=1786 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:19.590000 audit[1786]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c011ebff20 a2=fc6 a3=0 items=0 ppid=1639 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c477,c860 key=(null) Dec 13 14:32:19.590000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:32:21.251866 kernel: kauditd_printk_skb: 25 callbacks suppressed Dec 13 14:32:21.251967 kernel: audit: type=1130 audit(1734100341.246:1615): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.133:22-10.0.0.1:32826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.133:22-10.0.0.1:32826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.246702 systemd[1]: Started sshd@29-10.0.0.133:22-10.0.0.1:32826.service. Dec 13 14:32:21.284000 audit[5488]: USER_ACCT pid=5488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:21.285902 sshd[5488]: Accepted publickey for core from 10.0.0.1 port 32826 ssh2: RSA SHA256:EAWjiJIG7yD8wY8MRJ/aywn+PPpkYAApPiVa2OUhImg Dec 13 14:32:21.287052 sshd[5488]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:32:21.285000 audit[5488]: CRED_ACQ pid=5488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:21.291089 systemd-logind[1194]: New session 30 of user core. Dec 13 14:32:21.292149 systemd[1]: Started session-30.scope. Dec 13 14:32:21.298214 kernel: audit: type=1101 audit(1734100341.284:1616): pid=5488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:21.298274 kernel: audit: type=1103 audit(1734100341.285:1617): pid=5488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:21.298296 kernel: audit: type=1006 audit(1734100341.285:1618): pid=5488 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Dec 13 14:32:21.285000 audit[5488]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9f5ff390 a2=3 a3=0 items=0 ppid=1 pid=5488 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:21.304159 kernel: audit: type=1300 audit(1734100341.285:1618): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9f5ff390 a2=3 a3=0 items=0 ppid=1 pid=5488 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:21.304202 kernel: audit: type=1327 audit(1734100341.285:1618): proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:21.285000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:32:21.294000 audit[5488]: USER_START pid=5488 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:21.309510 kernel: audit: type=1105 audit(1734100341.294:1619): pid=5488 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:21.309553 kernel: audit: type=1103 audit(1734100341.296:1620): pid=5490 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:21.296000 audit[5490]: CRED_ACQ pid=5490 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:21.418869 sshd[5488]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:21.419000 audit[5488]: USER_END pid=5488 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:21.422056 systemd[1]: sshd@29-10.0.0.133:22-10.0.0.1:32826.service: Deactivated successfully. Dec 13 14:32:21.422796 systemd[1]: session-30.scope: Deactivated successfully. Dec 13 14:32:21.423923 systemd-logind[1194]: Session 30 logged out. Waiting for processes to exit. Dec 13 14:32:21.424734 systemd-logind[1194]: Removed session 30. Dec 13 14:32:21.419000 audit[5488]: CRED_DISP pid=5488 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:21.428189 kernel: audit: type=1106 audit(1734100341.419:1621): pid=5488 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:21.428253 kernel: audit: type=1104 audit(1734100341.419:1622): pid=5488 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:32:21.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.133:22-10.0.0.1:32826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:21.891832 env[1202]: time="2024-12-13T14:32:21.891305252Z" level=info msg="StopPodSandbox for \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\"" Dec 13 14:32:21.975701 env[1202]: 2024-12-13 14:32:21.932 [WARNING][5517] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--2zzf8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"70b747ec-d344-4421-ac6c-6b613f04fea5", ResourceVersion:"1280", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee", Pod:"csi-node-driver-2zzf8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6d039146e55", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:21.975701 env[1202]: 2024-12-13 14:32:21.932 [INFO][5517] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Dec 13 14:32:21.975701 env[1202]: 2024-12-13 14:32:21.932 [INFO][5517] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" iface="eth0" netns="" Dec 13 14:32:21.975701 env[1202]: 2024-12-13 14:32:21.932 [INFO][5517] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Dec 13 14:32:21.975701 env[1202]: 2024-12-13 14:32:21.932 [INFO][5517] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Dec 13 14:32:21.975701 env[1202]: 2024-12-13 14:32:21.962 [INFO][5524] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" HandleID="k8s-pod-network.fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Workload="localhost-k8s-csi--node--driver--2zzf8-eth0" Dec 13 14:32:21.975701 env[1202]: 2024-12-13 14:32:21.962 [INFO][5524] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:21.975701 env[1202]: 2024-12-13 14:32:21.962 [INFO][5524] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:21.975701 env[1202]: 2024-12-13 14:32:21.968 [WARNING][5524] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" HandleID="k8s-pod-network.fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Workload="localhost-k8s-csi--node--driver--2zzf8-eth0" Dec 13 14:32:21.975701 env[1202]: 2024-12-13 14:32:21.969 [INFO][5524] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" HandleID="k8s-pod-network.fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Workload="localhost-k8s-csi--node--driver--2zzf8-eth0" Dec 13 14:32:21.975701 env[1202]: 2024-12-13 14:32:21.970 [INFO][5524] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:21.975701 env[1202]: 2024-12-13 14:32:21.974 [INFO][5517] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Dec 13 14:32:21.976214 env[1202]: time="2024-12-13T14:32:21.975734745Z" level=info msg="TearDown network for sandbox \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\" successfully" Dec 13 14:32:21.976214 env[1202]: time="2024-12-13T14:32:21.975775443Z" level=info msg="StopPodSandbox for \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\" returns successfully" Dec 13 14:32:21.976621 env[1202]: time="2024-12-13T14:32:21.976533335Z" level=info msg="RemovePodSandbox for \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\"" Dec 13 14:32:21.976621 env[1202]: time="2024-12-13T14:32:21.976575956Z" level=info msg="Forcibly stopping sandbox \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\"" Dec 13 14:32:22.041501 env[1202]: 2024-12-13 14:32:22.009 [WARNING][5549] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--2zzf8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"70b747ec-d344-4421-ac6c-6b613f04fea5", ResourceVersion:"1280", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4afbb8b97f1ad94227879ee89c0a226ebc2cdbc3d1426a0f2e0753d92cd3f0ee", Pod:"csi-node-driver-2zzf8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6d039146e55", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:22.041501 env[1202]: 2024-12-13 14:32:22.010 [INFO][5549] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Dec 13 14:32:22.041501 env[1202]: 2024-12-13 14:32:22.010 [INFO][5549] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" iface="eth0" netns="" Dec 13 14:32:22.041501 env[1202]: 2024-12-13 14:32:22.010 [INFO][5549] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Dec 13 14:32:22.041501 env[1202]: 2024-12-13 14:32:22.010 [INFO][5549] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Dec 13 14:32:22.041501 env[1202]: 2024-12-13 14:32:22.030 [INFO][5557] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" HandleID="k8s-pod-network.fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Workload="localhost-k8s-csi--node--driver--2zzf8-eth0" Dec 13 14:32:22.041501 env[1202]: 2024-12-13 14:32:22.030 [INFO][5557] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:22.041501 env[1202]: 2024-12-13 14:32:22.030 [INFO][5557] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:22.041501 env[1202]: 2024-12-13 14:32:22.035 [WARNING][5557] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" HandleID="k8s-pod-network.fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Workload="localhost-k8s-csi--node--driver--2zzf8-eth0" Dec 13 14:32:22.041501 env[1202]: 2024-12-13 14:32:22.036 [INFO][5557] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" HandleID="k8s-pod-network.fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Workload="localhost-k8s-csi--node--driver--2zzf8-eth0" Dec 13 14:32:22.041501 env[1202]: 2024-12-13 14:32:22.037 [INFO][5557] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:22.041501 env[1202]: 2024-12-13 14:32:22.039 [INFO][5549] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7" Dec 13 14:32:22.042039 env[1202]: time="2024-12-13T14:32:22.041525430Z" level=info msg="TearDown network for sandbox \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\" successfully" Dec 13 14:32:22.048926 env[1202]: time="2024-12-13T14:32:22.048868266Z" level=info msg="RemovePodSandbox \"fe22b71b106e164bf1b447d9ac36cfb814e080b4990d6b13a09f67e5a826c9c7\" returns successfully" Dec 13 14:32:22.049426 env[1202]: time="2024-12-13T14:32:22.049404490Z" level=info msg="StopPodSandbox for \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\"" Dec 13 14:32:22.113443 env[1202]: 2024-12-13 14:32:22.081 [WARNING][5579] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0", GenerateName:"calico-apiserver-65c546cf68-", Namespace:"calico-apiserver", SelfLink:"", UID:"ecb2651e-9af3-4fc2-95b6-4b69df48c1c1", ResourceVersion:"1165", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65c546cf68", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa", Pod:"calico-apiserver-65c546cf68-5bqp7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib036bfdb5cd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:22.113443 env[1202]: 2024-12-13 14:32:22.082 [INFO][5579] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Dec 13 14:32:22.113443 env[1202]: 2024-12-13 14:32:22.082 [INFO][5579] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" iface="eth0" netns="" Dec 13 14:32:22.113443 env[1202]: 2024-12-13 14:32:22.082 [INFO][5579] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Dec 13 14:32:22.113443 env[1202]: 2024-12-13 14:32:22.082 [INFO][5579] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Dec 13 14:32:22.113443 env[1202]: 2024-12-13 14:32:22.102 [INFO][5586] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" HandleID="k8s-pod-network.741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Workload="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0" Dec 13 14:32:22.113443 env[1202]: 2024-12-13 14:32:22.102 [INFO][5586] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:22.113443 env[1202]: 2024-12-13 14:32:22.102 [INFO][5586] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:22.113443 env[1202]: 2024-12-13 14:32:22.108 [WARNING][5586] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" HandleID="k8s-pod-network.741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Workload="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0" Dec 13 14:32:22.113443 env[1202]: 2024-12-13 14:32:22.108 [INFO][5586] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" HandleID="k8s-pod-network.741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Workload="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0" Dec 13 14:32:22.113443 env[1202]: 2024-12-13 14:32:22.109 [INFO][5586] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:22.113443 env[1202]: 2024-12-13 14:32:22.111 [INFO][5579] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Dec 13 14:32:22.114091 env[1202]: time="2024-12-13T14:32:22.113498761Z" level=info msg="TearDown network for sandbox \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\" successfully" Dec 13 14:32:22.114091 env[1202]: time="2024-12-13T14:32:22.113536202Z" level=info msg="StopPodSandbox for \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\" returns successfully" Dec 13 14:32:22.114143 env[1202]: time="2024-12-13T14:32:22.114066795Z" level=info msg="RemovePodSandbox for \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\"" Dec 13 14:32:22.114170 env[1202]: time="2024-12-13T14:32:22.114116830Z" level=info msg="Forcibly stopping sandbox \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\"" Dec 13 14:32:22.188938 env[1202]: 2024-12-13 14:32:22.154 [WARNING][5608] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0", GenerateName:"calico-apiserver-65c546cf68-", Namespace:"calico-apiserver", SelfLink:"", UID:"ecb2651e-9af3-4fc2-95b6-4b69df48c1c1", ResourceVersion:"1165", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65c546cf68", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"90cf96e7d7c2d617ba884b07ed3703ba5d6d3fb8cfe754ebceed36c8a347f5aa", Pod:"calico-apiserver-65c546cf68-5bqp7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib036bfdb5cd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:22.188938 env[1202]: 2024-12-13 14:32:22.154 [INFO][5608] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Dec 13 14:32:22.188938 env[1202]: 2024-12-13 14:32:22.154 [INFO][5608] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" iface="eth0" netns="" Dec 13 14:32:22.188938 env[1202]: 2024-12-13 14:32:22.154 [INFO][5608] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Dec 13 14:32:22.188938 env[1202]: 2024-12-13 14:32:22.154 [INFO][5608] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Dec 13 14:32:22.188938 env[1202]: 2024-12-13 14:32:22.174 [INFO][5616] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" HandleID="k8s-pod-network.741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Workload="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0" Dec 13 14:32:22.188938 env[1202]: 2024-12-13 14:32:22.174 [INFO][5616] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:22.188938 env[1202]: 2024-12-13 14:32:22.174 [INFO][5616] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:22.188938 env[1202]: 2024-12-13 14:32:22.180 [WARNING][5616] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" HandleID="k8s-pod-network.741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Workload="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0" Dec 13 14:32:22.188938 env[1202]: 2024-12-13 14:32:22.181 [INFO][5616] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" HandleID="k8s-pod-network.741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Workload="localhost-k8s-calico--apiserver--65c546cf68--5bqp7-eth0" Dec 13 14:32:22.188938 env[1202]: 2024-12-13 14:32:22.182 [INFO][5616] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:22.188938 env[1202]: 2024-12-13 14:32:22.186 [INFO][5608] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0" Dec 13 14:32:22.188938 env[1202]: time="2024-12-13T14:32:22.188830910Z" level=info msg="TearDown network for sandbox \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\" successfully" Dec 13 14:32:22.256956 env[1202]: time="2024-12-13T14:32:22.256874284Z" level=info msg="RemovePodSandbox \"741c745a3a7c9a1954df6888d64d3c8f0e29318d7b645a321c6d328af6a59da0\" returns successfully" Dec 13 14:32:22.257335 env[1202]: time="2024-12-13T14:32:22.257300689Z" level=info msg="StopPodSandbox for \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\"" Dec 13 14:32:22.328558 env[1202]: 2024-12-13 14:32:22.295 [WARNING][5639] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"aa1c80dd-0a17-4c41-926a-b2ddc897d0c9", ResourceVersion:"1124", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2", Pod:"coredns-6f6b679f8f-h5wrj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali49a13f407b7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:22.328558 env[1202]: 2024-12-13 14:32:22.295 [INFO][5639] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Dec 13 14:32:22.328558 env[1202]: 2024-12-13 14:32:22.295 [INFO][5639] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" iface="eth0" netns="" Dec 13 14:32:22.328558 env[1202]: 2024-12-13 14:32:22.295 [INFO][5639] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Dec 13 14:32:22.328558 env[1202]: 2024-12-13 14:32:22.295 [INFO][5639] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Dec 13 14:32:22.328558 env[1202]: 2024-12-13 14:32:22.316 [INFO][5646] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" HandleID="k8s-pod-network.4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Workload="localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0" Dec 13 14:32:22.328558 env[1202]: 2024-12-13 14:32:22.316 [INFO][5646] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:22.328558 env[1202]: 2024-12-13 14:32:22.316 [INFO][5646] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:22.328558 env[1202]: 2024-12-13 14:32:22.323 [WARNING][5646] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" HandleID="k8s-pod-network.4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Workload="localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0" Dec 13 14:32:22.328558 env[1202]: 2024-12-13 14:32:22.323 [INFO][5646] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" HandleID="k8s-pod-network.4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Workload="localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0" Dec 13 14:32:22.328558 env[1202]: 2024-12-13 14:32:22.324 [INFO][5646] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:22.328558 env[1202]: 2024-12-13 14:32:22.326 [INFO][5639] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Dec 13 14:32:22.329324 env[1202]: time="2024-12-13T14:32:22.328606489Z" level=info msg="TearDown network for sandbox \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\" successfully" Dec 13 14:32:22.329324 env[1202]: time="2024-12-13T14:32:22.328649691Z" level=info msg="StopPodSandbox for \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\" returns successfully" Dec 13 14:32:22.329324 env[1202]: time="2024-12-13T14:32:22.329214599Z" level=info msg="RemovePodSandbox for \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\"" Dec 13 14:32:22.329324 env[1202]: time="2024-12-13T14:32:22.329252982Z" level=info msg="Forcibly stopping sandbox \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\"" Dec 13 14:32:22.395420 env[1202]: 2024-12-13 14:32:22.365 [WARNING][5668] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"aa1c80dd-0a17-4c41-926a-b2ddc897d0c9", ResourceVersion:"1124", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"38d6d49041780719b96b9b11b06f01296b5cb3f17513e6a0cdc60d60d6d338d2", Pod:"coredns-6f6b679f8f-h5wrj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali49a13f407b7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:22.395420 env[1202]: 2024-12-13 14:32:22.365 [INFO][5668] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Dec 13 14:32:22.395420 env[1202]: 2024-12-13 14:32:22.365 [INFO][5668] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" iface="eth0" netns="" Dec 13 14:32:22.395420 env[1202]: 2024-12-13 14:32:22.365 [INFO][5668] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Dec 13 14:32:22.395420 env[1202]: 2024-12-13 14:32:22.365 [INFO][5668] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Dec 13 14:32:22.395420 env[1202]: 2024-12-13 14:32:22.385 [INFO][5675] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" HandleID="k8s-pod-network.4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Workload="localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0" Dec 13 14:32:22.395420 env[1202]: 2024-12-13 14:32:22.385 [INFO][5675] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:22.395420 env[1202]: 2024-12-13 14:32:22.385 [INFO][5675] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:22.395420 env[1202]: 2024-12-13 14:32:22.390 [WARNING][5675] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" HandleID="k8s-pod-network.4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Workload="localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0" Dec 13 14:32:22.395420 env[1202]: 2024-12-13 14:32:22.390 [INFO][5675] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" HandleID="k8s-pod-network.4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Workload="localhost-k8s-coredns--6f6b679f8f--h5wrj-eth0" Dec 13 14:32:22.395420 env[1202]: 2024-12-13 14:32:22.391 [INFO][5675] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:22.395420 env[1202]: 2024-12-13 14:32:22.393 [INFO][5668] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943" Dec 13 14:32:22.396095 env[1202]: time="2024-12-13T14:32:22.395416283Z" level=info msg="TearDown network for sandbox \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\" successfully" Dec 13 14:32:22.398960 env[1202]: time="2024-12-13T14:32:22.398907871Z" level=info msg="RemovePodSandbox \"4d013860c9dfc07491b77ffeb1e840033d20dbe62ec2a72861d37347b84bd943\" returns successfully" Dec 13 14:32:22.399443 env[1202]: time="2024-12-13T14:32:22.399411333Z" level=info msg="StopPodSandbox for \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\"" Dec 13 14:32:22.399527 env[1202]: time="2024-12-13T14:32:22.399492927Z" level=info msg="TearDown network for sandbox \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\" successfully" Dec 13 14:32:22.399557 env[1202]: time="2024-12-13T14:32:22.399525678Z" level=info msg="StopPodSandbox for \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\" returns successfully" Dec 13 14:32:22.399938 env[1202]: time="2024-12-13T14:32:22.399914884Z" level=info msg="RemovePodSandbox for \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\"" Dec 13 14:32:22.399994 env[1202]: time="2024-12-13T14:32:22.399939270Z" level=info msg="Forcibly stopping sandbox \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\"" Dec 13 14:32:22.400053 env[1202]: time="2024-12-13T14:32:22.400014973Z" level=info msg="TearDown network for sandbox \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\" successfully" Dec 13 14:32:22.403884 env[1202]: time="2024-12-13T14:32:22.403829301Z" level=info msg="RemovePodSandbox \"a37ca0a53cc25848f6fbb0427817f6f52232cd9e38aa1de4f6871528a170e98a\" returns successfully" Dec 13 14:32:22.404185 env[1202]: time="2024-12-13T14:32:22.404129759Z" level=info msg="StopPodSandbox for \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\"" Dec 13 14:32:22.470466 env[1202]: 2024-12-13 14:32:22.440 [WARNING][5697] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0", GenerateName:"calico-apiserver-65c546cf68-", Namespace:"calico-apiserver", SelfLink:"", UID:"f39245bb-41cd-43ab-822c-851b5676f474", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65c546cf68", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202", Pod:"calico-apiserver-65c546cf68-4mhg9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid558e44b280", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:22.470466 env[1202]: 2024-12-13 14:32:22.440 [INFO][5697] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Dec 13 14:32:22.470466 env[1202]: 2024-12-13 14:32:22.440 [INFO][5697] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" iface="eth0" netns="" Dec 13 14:32:22.470466 env[1202]: 2024-12-13 14:32:22.440 [INFO][5697] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Dec 13 14:32:22.470466 env[1202]: 2024-12-13 14:32:22.440 [INFO][5697] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Dec 13 14:32:22.470466 env[1202]: 2024-12-13 14:32:22.460 [INFO][5704] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" HandleID="k8s-pod-network.c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Workload="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0" Dec 13 14:32:22.470466 env[1202]: 2024-12-13 14:32:22.460 [INFO][5704] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:22.470466 env[1202]: 2024-12-13 14:32:22.460 [INFO][5704] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:22.470466 env[1202]: 2024-12-13 14:32:22.466 [WARNING][5704] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" HandleID="k8s-pod-network.c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Workload="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0" Dec 13 14:32:22.470466 env[1202]: 2024-12-13 14:32:22.466 [INFO][5704] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" HandleID="k8s-pod-network.c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Workload="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0" Dec 13 14:32:22.470466 env[1202]: 2024-12-13 14:32:22.467 [INFO][5704] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:22.470466 env[1202]: 2024-12-13 14:32:22.468 [INFO][5697] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Dec 13 14:32:22.471199 env[1202]: time="2024-12-13T14:32:22.470445860Z" level=info msg="TearDown network for sandbox \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\" successfully" Dec 13 14:32:22.471199 env[1202]: time="2024-12-13T14:32:22.470483300Z" level=info msg="StopPodSandbox for \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\" returns successfully" Dec 13 14:32:22.472008 env[1202]: time="2024-12-13T14:32:22.471980801Z" level=info msg="RemovePodSandbox for \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\"" Dec 13 14:32:22.472084 env[1202]: time="2024-12-13T14:32:22.472015586Z" level=info msg="Forcibly stopping sandbox \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\"" Dec 13 14:32:22.543173 env[1202]: 2024-12-13 14:32:22.508 [WARNING][5726] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0", GenerateName:"calico-apiserver-65c546cf68-", Namespace:"calico-apiserver", SelfLink:"", UID:"f39245bb-41cd-43ab-822c-851b5676f474", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65c546cf68", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4eabe589b54b4c47af81ff5370d95fced72acf819b7dc63edb4f27214cd76202", Pod:"calico-apiserver-65c546cf68-4mhg9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid558e44b280", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:22.543173 env[1202]: 2024-12-13 14:32:22.508 [INFO][5726] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Dec 13 14:32:22.543173 env[1202]: 2024-12-13 14:32:22.508 [INFO][5726] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" iface="eth0" netns="" Dec 13 14:32:22.543173 env[1202]: 2024-12-13 14:32:22.508 [INFO][5726] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Dec 13 14:32:22.543173 env[1202]: 2024-12-13 14:32:22.508 [INFO][5726] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Dec 13 14:32:22.543173 env[1202]: 2024-12-13 14:32:22.530 [INFO][5734] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" HandleID="k8s-pod-network.c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Workload="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0" Dec 13 14:32:22.543173 env[1202]: 2024-12-13 14:32:22.530 [INFO][5734] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:22.543173 env[1202]: 2024-12-13 14:32:22.530 [INFO][5734] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:22.543173 env[1202]: 2024-12-13 14:32:22.535 [WARNING][5734] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" HandleID="k8s-pod-network.c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Workload="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0" Dec 13 14:32:22.543173 env[1202]: 2024-12-13 14:32:22.535 [INFO][5734] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" HandleID="k8s-pod-network.c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Workload="localhost-k8s-calico--apiserver--65c546cf68--4mhg9-eth0" Dec 13 14:32:22.543173 env[1202]: 2024-12-13 14:32:22.536 [INFO][5734] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:22.543173 env[1202]: 2024-12-13 14:32:22.538 [INFO][5726] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3" Dec 13 14:32:22.543744 env[1202]: time="2024-12-13T14:32:22.543707997Z" level=info msg="TearDown network for sandbox \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\" successfully" Dec 13 14:32:22.613809 env[1202]: time="2024-12-13T14:32:22.613747022Z" level=info msg="RemovePodSandbox \"c8af0000164af08380c8412e30247bf4bc5636b839248afb1462580c9dada1f3\" returns successfully" Dec 13 14:32:22.614267 env[1202]: time="2024-12-13T14:32:22.614239623Z" level=info msg="StopPodSandbox for \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\"" Dec 13 14:32:22.749734 env[1202]: 2024-12-13 14:32:22.718 [WARNING][5757] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0", GenerateName:"calico-kube-controllers-856cb6d94c-", Namespace:"calico-system", SelfLink:"", UID:"0076d11e-8179-4a1b-b0bb-1e2f984b0e09", ResourceVersion:"1259", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"856cb6d94c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406", Pod:"calico-kube-controllers-856cb6d94c-5hc9r", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali372940160e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:22.749734 env[1202]: 2024-12-13 14:32:22.719 [INFO][5757] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Dec 13 14:32:22.749734 env[1202]: 2024-12-13 14:32:22.719 [INFO][5757] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" iface="eth0" netns="" Dec 13 14:32:22.749734 env[1202]: 2024-12-13 14:32:22.719 [INFO][5757] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Dec 13 14:32:22.749734 env[1202]: 2024-12-13 14:32:22.719 [INFO][5757] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Dec 13 14:32:22.749734 env[1202]: 2024-12-13 14:32:22.738 [INFO][5764] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" HandleID="k8s-pod-network.ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Workload="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0" Dec 13 14:32:22.749734 env[1202]: 2024-12-13 14:32:22.738 [INFO][5764] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:22.749734 env[1202]: 2024-12-13 14:32:22.738 [INFO][5764] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:22.749734 env[1202]: 2024-12-13 14:32:22.744 [WARNING][5764] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" HandleID="k8s-pod-network.ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Workload="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0" Dec 13 14:32:22.749734 env[1202]: 2024-12-13 14:32:22.744 [INFO][5764] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" HandleID="k8s-pod-network.ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Workload="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0" Dec 13 14:32:22.749734 env[1202]: 2024-12-13 14:32:22.746 [INFO][5764] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:22.749734 env[1202]: 2024-12-13 14:32:22.747 [INFO][5757] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Dec 13 14:32:22.749734 env[1202]: time="2024-12-13T14:32:22.749713855Z" level=info msg="TearDown network for sandbox \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\" successfully" Dec 13 14:32:22.750251 env[1202]: time="2024-12-13T14:32:22.749748870Z" level=info msg="StopPodSandbox for \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\" returns successfully" Dec 13 14:32:22.750282 env[1202]: time="2024-12-13T14:32:22.750259516Z" level=info msg="RemovePodSandbox for \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\"" Dec 13 14:32:22.750331 env[1202]: time="2024-12-13T14:32:22.750296115Z" level=info msg="Forcibly stopping sandbox \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\"" Dec 13 14:32:22.806220 env[1202]: 2024-12-13 14:32:22.780 [WARNING][5787] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0", GenerateName:"calico-kube-controllers-856cb6d94c-", Namespace:"calico-system", SelfLink:"", UID:"0076d11e-8179-4a1b-b0bb-1e2f984b0e09", ResourceVersion:"1259", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"856cb6d94c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"31c4212edb90afd06aba80e730943b597344b87db76f58eb762a697022d7f406", Pod:"calico-kube-controllers-856cb6d94c-5hc9r", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali372940160e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:22.806220 env[1202]: 2024-12-13 14:32:22.780 [INFO][5787] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Dec 13 14:32:22.806220 env[1202]: 2024-12-13 14:32:22.780 [INFO][5787] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" iface="eth0" netns="" Dec 13 14:32:22.806220 env[1202]: 2024-12-13 14:32:22.780 [INFO][5787] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Dec 13 14:32:22.806220 env[1202]: 2024-12-13 14:32:22.780 [INFO][5787] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Dec 13 14:32:22.806220 env[1202]: 2024-12-13 14:32:22.797 [INFO][5794] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" HandleID="k8s-pod-network.ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Workload="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0" Dec 13 14:32:22.806220 env[1202]: 2024-12-13 14:32:22.797 [INFO][5794] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:22.806220 env[1202]: 2024-12-13 14:32:22.797 [INFO][5794] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:22.806220 env[1202]: 2024-12-13 14:32:22.802 [WARNING][5794] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" HandleID="k8s-pod-network.ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Workload="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0" Dec 13 14:32:22.806220 env[1202]: 2024-12-13 14:32:22.802 [INFO][5794] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" HandleID="k8s-pod-network.ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Workload="localhost-k8s-calico--kube--controllers--856cb6d94c--5hc9r-eth0" Dec 13 14:32:22.806220 env[1202]: 2024-12-13 14:32:22.803 [INFO][5794] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:22.806220 env[1202]: 2024-12-13 14:32:22.804 [INFO][5787] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe" Dec 13 14:32:22.806697 env[1202]: time="2024-12-13T14:32:22.806248140Z" level=info msg="TearDown network for sandbox \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\" successfully" Dec 13 14:32:22.884863 env[1202]: time="2024-12-13T14:32:22.884791016Z" level=info msg="RemovePodSandbox \"ca1d67f17e05acd95b38f732336d1b7bd0761213e350aaa65c6fab45e50142fe\" returns successfully" Dec 13 14:32:22.885307 env[1202]: time="2024-12-13T14:32:22.885286783Z" level=info msg="StopPodSandbox for \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\"" Dec 13 14:32:23.011083 env[1202]: 2024-12-13 14:32:22.953 [WARNING][5817] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f0a57d84-e132-4284-94a6-b96e0303f6d5", ResourceVersion:"1120", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d", Pod:"coredns-6f6b679f8f-wrcpk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5e32d82cbae", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:23.011083 env[1202]: 2024-12-13 14:32:22.954 [INFO][5817] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Dec 13 14:32:23.011083 env[1202]: 2024-12-13 14:32:22.954 [INFO][5817] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" iface="eth0" netns="" Dec 13 14:32:23.011083 env[1202]: 2024-12-13 14:32:22.954 [INFO][5817] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Dec 13 14:32:23.011083 env[1202]: 2024-12-13 14:32:22.954 [INFO][5817] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Dec 13 14:32:23.011083 env[1202]: 2024-12-13 14:32:22.973 [INFO][5824] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" HandleID="k8s-pod-network.1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Workload="localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0" Dec 13 14:32:23.011083 env[1202]: 2024-12-13 14:32:22.973 [INFO][5824] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:23.011083 env[1202]: 2024-12-13 14:32:22.973 [INFO][5824] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:23.011083 env[1202]: 2024-12-13 14:32:22.989 [WARNING][5824] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" HandleID="k8s-pod-network.1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Workload="localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0" Dec 13 14:32:23.011083 env[1202]: 2024-12-13 14:32:22.989 [INFO][5824] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" HandleID="k8s-pod-network.1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Workload="localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0" Dec 13 14:32:23.011083 env[1202]: 2024-12-13 14:32:22.991 [INFO][5824] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:23.011083 env[1202]: 2024-12-13 14:32:22.993 [INFO][5817] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Dec 13 14:32:23.011083 env[1202]: time="2024-12-13T14:32:23.011053006Z" level=info msg="TearDown network for sandbox \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\" successfully" Dec 13 14:32:23.011083 env[1202]: time="2024-12-13T14:32:23.011082100Z" level=info msg="StopPodSandbox for \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\" returns successfully" Dec 13 14:32:23.011784 env[1202]: time="2024-12-13T14:32:23.011469773Z" level=info msg="RemovePodSandbox for \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\"" Dec 13 14:32:23.011784 env[1202]: time="2024-12-13T14:32:23.011491504Z" level=info msg="Forcibly stopping sandbox \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\"" Dec 13 14:32:23.084262 env[1202]: 2024-12-13 14:32:23.056 [WARNING][5845] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f0a57d84-e132-4284-94a6-b96e0303f6d5", ResourceVersion:"1120", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 30, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1494b2275180e6c4a03b067ecb88afd5d738cabc9054aa9f331192f03477329d", Pod:"coredns-6f6b679f8f-wrcpk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5e32d82cbae", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:23.084262 env[1202]: 2024-12-13 14:32:23.056 [INFO][5845] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Dec 13 14:32:23.084262 env[1202]: 2024-12-13 14:32:23.056 [INFO][5845] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" iface="eth0" netns="" Dec 13 14:32:23.084262 env[1202]: 2024-12-13 14:32:23.056 [INFO][5845] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Dec 13 14:32:23.084262 env[1202]: 2024-12-13 14:32:23.056 [INFO][5845] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Dec 13 14:32:23.084262 env[1202]: 2024-12-13 14:32:23.075 [INFO][5852] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" HandleID="k8s-pod-network.1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Workload="localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0" Dec 13 14:32:23.084262 env[1202]: 2024-12-13 14:32:23.075 [INFO][5852] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:23.084262 env[1202]: 2024-12-13 14:32:23.075 [INFO][5852] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:23.084262 env[1202]: 2024-12-13 14:32:23.080 [WARNING][5852] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" HandleID="k8s-pod-network.1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Workload="localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0" Dec 13 14:32:23.084262 env[1202]: 2024-12-13 14:32:23.080 [INFO][5852] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" HandleID="k8s-pod-network.1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Workload="localhost-k8s-coredns--6f6b679f8f--wrcpk-eth0" Dec 13 14:32:23.084262 env[1202]: 2024-12-13 14:32:23.081 [INFO][5852] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:23.084262 env[1202]: 2024-12-13 14:32:23.082 [INFO][5845] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6" Dec 13 14:32:23.084747 env[1202]: time="2024-12-13T14:32:23.084291518Z" level=info msg="TearDown network for sandbox \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\" successfully" Dec 13 14:32:23.087567 env[1202]: time="2024-12-13T14:32:23.087532532Z" level=info msg="RemovePodSandbox \"1096a25ecfb11465e3baee5df41f2d1ff47b4005ec1046d41f6b2596c7f16dc6\" returns successfully"