Dec 13 02:28:40.650853 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 02:28:40.650875 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:28:40.650886 kernel: Disabled fast string operations Dec 13 02:28:40.650892 kernel: BIOS-provided physical RAM map: Dec 13 02:28:40.650895 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Dec 13 02:28:40.650899 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Dec 13 02:28:40.650906 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Dec 13 02:28:40.650910 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Dec 13 02:28:40.650914 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Dec 13 02:28:40.650918 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Dec 13 02:28:40.650922 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Dec 13 02:28:40.650926 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Dec 13 02:28:40.650930 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Dec 13 02:28:40.650934 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Dec 13 02:28:40.650940 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Dec 13 02:28:40.650945 kernel: NX (Execute Disable) protection: active Dec 13 02:28:40.650949 kernel: SMBIOS 2.7 present. Dec 13 02:28:40.650954 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Dec 13 02:28:40.650958 kernel: vmware: hypercall mode: 0x00 Dec 13 02:28:40.650963 kernel: Hypervisor detected: VMware Dec 13 02:28:40.650968 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Dec 13 02:28:40.650972 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Dec 13 02:28:40.650976 kernel: vmware: using clock offset of 3307394787 ns Dec 13 02:28:40.650981 kernel: tsc: Detected 3408.000 MHz processor Dec 13 02:28:40.650986 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 02:28:40.650991 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 02:28:40.650995 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Dec 13 02:28:40.651000 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 02:28:40.651004 kernel: total RAM covered: 3072M Dec 13 02:28:40.651010 kernel: Found optimal setting for mtrr clean up Dec 13 02:28:40.651015 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Dec 13 02:28:40.651019 kernel: Using GB pages for direct mapping Dec 13 02:28:40.651024 kernel: ACPI: Early table checksum verification disabled Dec 13 02:28:40.651028 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Dec 13 02:28:40.651032 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Dec 13 02:28:40.651037 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Dec 13 02:28:40.651041 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Dec 13 02:28:40.651046 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Dec 13 02:28:40.651050 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Dec 13 02:28:40.651056 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Dec 13 02:28:40.651062 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Dec 13 02:28:40.651067 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Dec 13 02:28:40.651072 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Dec 13 02:28:40.651077 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Dec 13 02:28:40.651083 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Dec 13 02:28:40.651088 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Dec 13 02:28:40.651092 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Dec 13 02:28:40.651097 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Dec 13 02:28:40.651102 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Dec 13 02:28:40.651107 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Dec 13 02:28:40.651112 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Dec 13 02:28:40.651117 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Dec 13 02:28:40.651121 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Dec 13 02:28:40.651127 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Dec 13 02:28:40.651132 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Dec 13 02:28:40.651137 kernel: system APIC only can use physical flat Dec 13 02:28:40.651141 kernel: Setting APIC routing to physical flat. Dec 13 02:28:40.651146 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 02:28:40.651151 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Dec 13 02:28:40.651156 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Dec 13 02:28:40.651161 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Dec 13 02:28:40.651165 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Dec 13 02:28:40.651171 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Dec 13 02:28:40.651176 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Dec 13 02:28:40.651180 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Dec 13 02:28:40.651185 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Dec 13 02:28:40.651190 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Dec 13 02:28:40.651195 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Dec 13 02:28:40.651199 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Dec 13 02:28:40.651205 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Dec 13 02:28:40.651209 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Dec 13 02:28:40.651214 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Dec 13 02:28:40.651220 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Dec 13 02:28:40.651224 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Dec 13 02:28:40.651229 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Dec 13 02:28:40.651234 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Dec 13 02:28:40.651238 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Dec 13 02:28:40.651243 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Dec 13 02:28:40.651248 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Dec 13 02:28:40.651253 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Dec 13 02:28:40.651257 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Dec 13 02:28:40.651262 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Dec 13 02:28:40.651268 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Dec 13 02:28:40.651272 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Dec 13 02:28:40.651277 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Dec 13 02:28:40.651282 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Dec 13 02:28:40.651286 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Dec 13 02:28:40.651291 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Dec 13 02:28:40.651296 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Dec 13 02:28:40.651301 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Dec 13 02:28:40.651306 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Dec 13 02:28:40.651310 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Dec 13 02:28:40.651316 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Dec 13 02:28:40.651321 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Dec 13 02:28:40.651326 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Dec 13 02:28:40.651331 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Dec 13 02:28:40.651336 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Dec 13 02:28:40.651340 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Dec 13 02:28:40.651345 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Dec 13 02:28:40.651350 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Dec 13 02:28:40.651354 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Dec 13 02:28:40.651359 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Dec 13 02:28:40.651365 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Dec 13 02:28:40.651369 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Dec 13 02:28:40.651374 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Dec 13 02:28:40.651379 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Dec 13 02:28:40.651384 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Dec 13 02:28:40.651388 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Dec 13 02:28:40.651393 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Dec 13 02:28:40.651398 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Dec 13 02:28:40.651403 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Dec 13 02:28:40.651408 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Dec 13 02:28:40.651413 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Dec 13 02:28:40.651418 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Dec 13 02:28:40.651423 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Dec 13 02:28:40.651427 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Dec 13 02:28:40.651432 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Dec 13 02:28:40.651438 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Dec 13 02:28:40.651445 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Dec 13 02:28:40.651451 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Dec 13 02:28:40.651456 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Dec 13 02:28:40.651461 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Dec 13 02:28:40.651467 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Dec 13 02:28:40.651472 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Dec 13 02:28:40.651477 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Dec 13 02:28:40.651483 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Dec 13 02:28:40.651488 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Dec 13 02:28:40.651493 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Dec 13 02:28:40.651498 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Dec 13 02:28:40.651503 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Dec 13 02:28:40.651509 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Dec 13 02:28:40.651514 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Dec 13 02:28:40.651519 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Dec 13 02:28:40.651524 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Dec 13 02:28:40.651529 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Dec 13 02:28:40.651535 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Dec 13 02:28:40.651540 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Dec 13 02:28:40.651545 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Dec 13 02:28:40.651550 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Dec 13 02:28:40.651555 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Dec 13 02:28:40.651561 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Dec 13 02:28:40.651566 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Dec 13 02:28:40.651571 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Dec 13 02:28:40.651577 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Dec 13 02:28:40.651583 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Dec 13 02:28:40.651591 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Dec 13 02:28:40.651598 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Dec 13 02:28:40.651603 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Dec 13 02:28:40.651608 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Dec 13 02:28:40.651613 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Dec 13 02:28:40.651619 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Dec 13 02:28:40.651625 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Dec 13 02:28:40.651630 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Dec 13 02:28:40.651635 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Dec 13 02:28:40.651640 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Dec 13 02:28:40.651645 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Dec 13 02:28:40.651650 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Dec 13 02:28:40.651655 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Dec 13 02:28:40.651660 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Dec 13 02:28:40.651666 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Dec 13 02:28:40.651671 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Dec 13 02:28:40.651676 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Dec 13 02:28:40.651681 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Dec 13 02:28:40.651687 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Dec 13 02:28:40.651692 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Dec 13 02:28:40.651697 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Dec 13 02:28:40.651702 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Dec 13 02:28:40.651707 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Dec 13 02:28:40.651712 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Dec 13 02:28:40.651718 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Dec 13 02:28:40.651723 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Dec 13 02:28:40.651728 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Dec 13 02:28:40.651733 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Dec 13 02:28:40.651738 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Dec 13 02:28:40.651744 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Dec 13 02:28:40.651749 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Dec 13 02:28:40.651754 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Dec 13 02:28:40.651759 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Dec 13 02:28:40.651764 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Dec 13 02:28:40.651770 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Dec 13 02:28:40.651775 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Dec 13 02:28:40.651780 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Dec 13 02:28:40.651785 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Dec 13 02:28:40.651790 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Dec 13 02:28:40.651795 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Dec 13 02:28:40.651800 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 02:28:40.651806 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Dec 13 02:28:40.651811 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Dec 13 02:28:40.651816 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Dec 13 02:28:40.651822 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Dec 13 02:28:40.651828 kernel: Zone ranges: Dec 13 02:28:40.651841 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 02:28:40.651846 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Dec 13 02:28:40.651852 kernel: Normal empty Dec 13 02:28:40.651857 kernel: Movable zone start for each node Dec 13 02:28:40.651862 kernel: Early memory node ranges Dec 13 02:28:40.651867 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Dec 13 02:28:40.651872 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Dec 13 02:28:40.651879 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Dec 13 02:28:40.651884 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Dec 13 02:28:40.651889 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 02:28:40.651894 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Dec 13 02:28:40.651900 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Dec 13 02:28:40.651905 kernel: ACPI: PM-Timer IO Port: 0x1008 Dec 13 02:28:40.651910 kernel: system APIC only can use physical flat Dec 13 02:28:40.651915 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Dec 13 02:28:40.651920 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Dec 13 02:28:40.651926 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Dec 13 02:28:40.651931 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Dec 13 02:28:40.651937 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Dec 13 02:28:40.651942 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Dec 13 02:28:40.651947 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Dec 13 02:28:40.651952 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Dec 13 02:28:40.651957 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Dec 13 02:28:40.651963 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Dec 13 02:28:40.651968 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Dec 13 02:28:40.651973 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Dec 13 02:28:40.651979 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Dec 13 02:28:40.651985 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Dec 13 02:28:40.651990 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Dec 13 02:28:40.651995 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Dec 13 02:28:40.652000 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Dec 13 02:28:40.652005 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Dec 13 02:28:40.652010 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Dec 13 02:28:40.652015 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Dec 13 02:28:40.652020 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Dec 13 02:28:40.652026 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Dec 13 02:28:40.652031 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Dec 13 02:28:40.652036 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Dec 13 02:28:40.652042 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Dec 13 02:28:40.652047 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Dec 13 02:28:40.652052 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Dec 13 02:28:40.652057 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Dec 13 02:28:40.652062 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Dec 13 02:28:40.652067 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Dec 13 02:28:40.652072 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Dec 13 02:28:40.652078 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Dec 13 02:28:40.652083 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Dec 13 02:28:40.652089 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Dec 13 02:28:40.652094 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Dec 13 02:28:40.652099 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Dec 13 02:28:40.652104 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Dec 13 02:28:40.652109 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Dec 13 02:28:40.652115 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Dec 13 02:28:40.652119 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Dec 13 02:28:40.652125 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Dec 13 02:28:40.652131 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Dec 13 02:28:40.652136 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Dec 13 02:28:40.652141 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Dec 13 02:28:40.652146 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Dec 13 02:28:40.652151 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Dec 13 02:28:40.652156 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Dec 13 02:28:40.652161 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Dec 13 02:28:40.652167 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Dec 13 02:28:40.652172 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Dec 13 02:28:40.652178 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Dec 13 02:28:40.652183 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Dec 13 02:28:40.652188 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Dec 13 02:28:40.652193 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Dec 13 02:28:40.652198 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Dec 13 02:28:40.652204 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Dec 13 02:28:40.652209 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Dec 13 02:28:40.652214 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Dec 13 02:28:40.652219 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Dec 13 02:28:40.652225 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Dec 13 02:28:40.652230 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Dec 13 02:28:40.652235 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Dec 13 02:28:40.652241 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Dec 13 02:28:40.652246 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Dec 13 02:28:40.652251 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Dec 13 02:28:40.652256 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Dec 13 02:28:40.652261 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Dec 13 02:28:40.652266 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Dec 13 02:28:40.652271 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Dec 13 02:28:40.652277 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Dec 13 02:28:40.652283 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Dec 13 02:28:40.652288 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Dec 13 02:28:40.652293 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Dec 13 02:28:40.652298 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Dec 13 02:28:40.652303 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Dec 13 02:28:40.652308 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Dec 13 02:28:40.652313 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Dec 13 02:28:40.652318 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Dec 13 02:28:40.652324 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Dec 13 02:28:40.652329 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Dec 13 02:28:40.652335 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Dec 13 02:28:40.652340 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Dec 13 02:28:40.652345 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Dec 13 02:28:40.652350 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Dec 13 02:28:40.652355 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Dec 13 02:28:40.652360 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Dec 13 02:28:40.652365 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Dec 13 02:28:40.652370 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Dec 13 02:28:40.652376 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Dec 13 02:28:40.652381 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Dec 13 02:28:40.652386 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Dec 13 02:28:40.652392 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Dec 13 02:28:40.652397 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Dec 13 02:28:40.652402 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Dec 13 02:28:40.652407 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Dec 13 02:28:40.652412 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Dec 13 02:28:40.652418 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Dec 13 02:28:40.652424 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Dec 13 02:28:40.652429 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Dec 13 02:28:40.652434 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Dec 13 02:28:40.652439 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Dec 13 02:28:40.652444 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Dec 13 02:28:40.652449 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Dec 13 02:28:40.652454 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Dec 13 02:28:40.652459 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Dec 13 02:28:40.652465 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Dec 13 02:28:40.652471 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Dec 13 02:28:40.652476 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Dec 13 02:28:40.652481 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Dec 13 02:28:40.652486 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Dec 13 02:28:40.652492 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Dec 13 02:28:40.652497 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Dec 13 02:28:40.652502 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Dec 13 02:28:40.652507 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Dec 13 02:28:40.652512 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Dec 13 02:28:40.652517 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Dec 13 02:28:40.652523 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Dec 13 02:28:40.652528 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Dec 13 02:28:40.652534 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Dec 13 02:28:40.652539 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Dec 13 02:28:40.652544 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Dec 13 02:28:40.652550 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Dec 13 02:28:40.652555 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Dec 13 02:28:40.652560 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Dec 13 02:28:40.652565 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Dec 13 02:28:40.652571 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Dec 13 02:28:40.652576 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Dec 13 02:28:40.652581 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Dec 13 02:28:40.652587 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Dec 13 02:28:40.652594 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Dec 13 02:28:40.652603 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 02:28:40.652608 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Dec 13 02:28:40.652613 kernel: TSC deadline timer available Dec 13 02:28:40.652618 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Dec 13 02:28:40.652624 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Dec 13 02:28:40.652630 kernel: Booting paravirtualized kernel on VMware hypervisor Dec 13 02:28:40.652635 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 02:28:40.652641 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Dec 13 02:28:40.652646 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 02:28:40.652651 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 02:28:40.652657 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Dec 13 02:28:40.652662 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Dec 13 02:28:40.652667 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Dec 13 02:28:40.652674 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Dec 13 02:28:40.652679 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Dec 13 02:28:40.652684 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Dec 13 02:28:40.652689 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Dec 13 02:28:40.652701 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Dec 13 02:28:40.652707 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Dec 13 02:28:40.652712 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Dec 13 02:28:40.652718 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Dec 13 02:28:40.652723 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Dec 13 02:28:40.652730 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Dec 13 02:28:40.652736 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Dec 13 02:28:40.652741 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Dec 13 02:28:40.652746 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Dec 13 02:28:40.652752 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Dec 13 02:28:40.652757 kernel: Policy zone: DMA32 Dec 13 02:28:40.652764 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:28:40.652770 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 02:28:40.652776 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Dec 13 02:28:40.652782 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Dec 13 02:28:40.652788 kernel: printk: log_buf_len min size: 262144 bytes Dec 13 02:28:40.652793 kernel: printk: log_buf_len: 1048576 bytes Dec 13 02:28:40.652799 kernel: printk: early log buf free: 239728(91%) Dec 13 02:28:40.652804 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 02:28:40.652810 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 02:28:40.652815 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 02:28:40.652821 kernel: Memory: 1940392K/2096628K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 155976K reserved, 0K cma-reserved) Dec 13 02:28:40.652828 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Dec 13 02:28:40.652842 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 02:28:40.652848 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 02:28:40.652855 kernel: rcu: Hierarchical RCU implementation. Dec 13 02:28:40.652861 kernel: rcu: RCU event tracing is enabled. Dec 13 02:28:40.652867 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Dec 13 02:28:40.652873 kernel: Rude variant of Tasks RCU enabled. Dec 13 02:28:40.652879 kernel: Tracing variant of Tasks RCU enabled. Dec 13 02:28:40.652884 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 02:28:40.652890 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Dec 13 02:28:40.652896 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Dec 13 02:28:40.652901 kernel: random: crng init done Dec 13 02:28:40.652906 kernel: Console: colour VGA+ 80x25 Dec 13 02:28:40.652912 kernel: printk: console [tty0] enabled Dec 13 02:28:40.652917 kernel: printk: console [ttyS0] enabled Dec 13 02:28:40.652924 kernel: ACPI: Core revision 20210730 Dec 13 02:28:40.652930 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Dec 13 02:28:40.652935 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 02:28:40.652941 kernel: x2apic enabled Dec 13 02:28:40.652946 kernel: Switched APIC routing to physical x2apic. Dec 13 02:28:40.652952 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 02:28:40.652958 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Dec 13 02:28:40.652963 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Dec 13 02:28:40.652969 kernel: Disabled fast string operations Dec 13 02:28:40.652976 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 02:28:40.652981 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 02:28:40.652987 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 02:28:40.652992 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 02:28:40.652998 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 02:28:40.653004 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 02:28:40.653009 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 02:28:40.653015 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 02:28:40.653022 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 02:28:40.653028 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 02:28:40.653034 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 02:28:40.653039 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 02:28:40.653045 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 02:28:40.653051 kernel: SRBDS: Unknown: Dependent on hypervisor status Dec 13 02:28:40.653056 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 02:28:40.653062 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 02:28:40.653067 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 02:28:40.653074 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 02:28:40.653079 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 02:28:40.653085 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Dec 13 02:28:40.653090 kernel: Freeing SMP alternatives memory: 32K Dec 13 02:28:40.653096 kernel: pid_max: default: 131072 minimum: 1024 Dec 13 02:28:40.653102 kernel: LSM: Security Framework initializing Dec 13 02:28:40.653107 kernel: SELinux: Initializing. Dec 13 02:28:40.653113 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 02:28:40.653119 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 02:28:40.653125 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Dec 13 02:28:40.653131 kernel: Performance Events: Skylake events, core PMU driver. Dec 13 02:28:40.653136 kernel: core: CPUID marked event: 'cpu cycles' unavailable Dec 13 02:28:40.653142 kernel: core: CPUID marked event: 'instructions' unavailable Dec 13 02:28:40.653148 kernel: core: CPUID marked event: 'bus cycles' unavailable Dec 13 02:28:40.653154 kernel: core: CPUID marked event: 'cache references' unavailable Dec 13 02:28:40.653159 kernel: core: CPUID marked event: 'cache misses' unavailable Dec 13 02:28:40.653164 kernel: core: CPUID marked event: 'branch instructions' unavailable Dec 13 02:28:40.653170 kernel: core: CPUID marked event: 'branch misses' unavailable Dec 13 02:28:40.653177 kernel: ... version: 1 Dec 13 02:28:40.653182 kernel: ... bit width: 48 Dec 13 02:28:40.653188 kernel: ... generic registers: 4 Dec 13 02:28:40.653194 kernel: ... value mask: 0000ffffffffffff Dec 13 02:28:40.653199 kernel: ... max period: 000000007fffffff Dec 13 02:28:40.653205 kernel: ... fixed-purpose events: 0 Dec 13 02:28:40.653210 kernel: ... event mask: 000000000000000f Dec 13 02:28:40.653216 kernel: signal: max sigframe size: 1776 Dec 13 02:28:40.653221 kernel: rcu: Hierarchical SRCU implementation. Dec 13 02:28:40.653228 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 02:28:40.653234 kernel: smp: Bringing up secondary CPUs ... Dec 13 02:28:40.653240 kernel: x86: Booting SMP configuration: Dec 13 02:28:40.653245 kernel: .... node #0, CPUs: #1 Dec 13 02:28:40.653251 kernel: Disabled fast string operations Dec 13 02:28:40.653256 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Dec 13 02:28:40.653262 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Dec 13 02:28:40.653267 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 02:28:40.653273 kernel: smpboot: Max logical packages: 128 Dec 13 02:28:40.653278 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Dec 13 02:28:40.653285 kernel: devtmpfs: initialized Dec 13 02:28:40.653290 kernel: x86/mm: Memory block size: 128MB Dec 13 02:28:40.653296 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Dec 13 02:28:40.653302 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 02:28:40.653307 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Dec 13 02:28:40.653313 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 02:28:40.653318 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 02:28:40.653324 kernel: audit: initializing netlink subsys (disabled) Dec 13 02:28:40.653330 kernel: audit: type=2000 audit(1734056918.059:1): state=initialized audit_enabled=0 res=1 Dec 13 02:28:40.653336 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 02:28:40.653342 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 02:28:40.653347 kernel: cpuidle: using governor menu Dec 13 02:28:40.653353 kernel: Simple Boot Flag at 0x36 set to 0x80 Dec 13 02:28:40.653358 kernel: ACPI: bus type PCI registered Dec 13 02:28:40.653364 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 02:28:40.653369 kernel: dca service started, version 1.12.1 Dec 13 02:28:40.653375 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Dec 13 02:28:40.653381 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Dec 13 02:28:40.653387 kernel: PCI: Using configuration type 1 for base access Dec 13 02:28:40.653393 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 02:28:40.653398 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 02:28:40.653404 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 02:28:40.653409 kernel: ACPI: Added _OSI(Module Device) Dec 13 02:28:40.653415 kernel: ACPI: Added _OSI(Processor Device) Dec 13 02:28:40.653420 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 02:28:40.653426 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 02:28:40.653431 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 02:28:40.653438 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 02:28:40.653443 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 02:28:40.653449 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 02:28:40.653454 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Dec 13 02:28:40.653460 kernel: ACPI: Interpreter enabled Dec 13 02:28:40.653466 kernel: ACPI: PM: (supports S0 S1 S5) Dec 13 02:28:40.653471 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 02:28:40.653477 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 02:28:40.653482 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Dec 13 02:28:40.653489 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Dec 13 02:28:40.653562 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 02:28:40.653618 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Dec 13 02:28:40.653665 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Dec 13 02:28:40.653675 kernel: PCI host bridge to bus 0000:00 Dec 13 02:28:40.653721 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 02:28:40.653764 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000cffff window] Dec 13 02:28:40.653804 kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000d3fff window] Dec 13 02:28:40.653858 kernel: pci_bus 0000:00: root bus resource [mem 0x000d4000-0x000d7fff window] Dec 13 02:28:40.653904 kernel: pci_bus 0000:00: root bus resource [mem 0x000d8000-0x000dbfff window] Dec 13 02:28:40.653944 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 02:28:40.653984 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 02:28:40.654024 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Dec 13 02:28:40.654065 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Dec 13 02:28:40.654118 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Dec 13 02:28:40.654171 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Dec 13 02:28:40.654220 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Dec 13 02:28:40.654270 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Dec 13 02:28:40.654315 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Dec 13 02:28:40.654362 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 13 02:28:40.654409 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 13 02:28:40.654453 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 13 02:28:40.654498 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 13 02:28:40.654547 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Dec 13 02:28:40.654593 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Dec 13 02:28:40.654638 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Dec 13 02:28:40.654689 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Dec 13 02:28:40.654735 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Dec 13 02:28:40.654780 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Dec 13 02:28:40.654829 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Dec 13 02:28:40.662023 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Dec 13 02:28:40.662078 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Dec 13 02:28:40.662126 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Dec 13 02:28:40.662175 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Dec 13 02:28:40.662221 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 02:28:40.662273 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Dec 13 02:28:40.662325 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.662373 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.662423 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.662471 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.662523 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.662568 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.662618 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.662668 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.662722 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.662770 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.662820 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.662897 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.662950 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.665450 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.665513 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.665577 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.665632 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.665681 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.665738 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.665786 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.665847 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.665900 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.665950 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.665996 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.666046 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.666092 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.666142 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.666191 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.666240 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.666287 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.666335 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.666380 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.666429 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.666477 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.666527 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.666572 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.666620 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.666667 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.666724 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.666771 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.666822 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.666904 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.666971 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.667036 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.667088 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.667153 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.667210 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.667272 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.667343 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.667401 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.667474 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.667531 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.667584 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.667640 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.667727 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.667791 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.667939 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.667989 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.668040 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.668085 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.668134 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.668178 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.668227 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Dec 13 02:28:40.668272 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.668321 kernel: pci_bus 0000:01: extended config space not accessible Dec 13 02:28:40.668370 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 02:28:40.668417 kernel: pci_bus 0000:02: extended config space not accessible Dec 13 02:28:40.668426 kernel: acpiphp: Slot [32] registered Dec 13 02:28:40.668432 kernel: acpiphp: Slot [33] registered Dec 13 02:28:40.668438 kernel: acpiphp: Slot [34] registered Dec 13 02:28:40.668444 kernel: acpiphp: Slot [35] registered Dec 13 02:28:40.668450 kernel: acpiphp: Slot [36] registered Dec 13 02:28:40.668456 kernel: acpiphp: Slot [37] registered Dec 13 02:28:40.668463 kernel: acpiphp: Slot [38] registered Dec 13 02:28:40.668469 kernel: acpiphp: Slot [39] registered Dec 13 02:28:40.668474 kernel: acpiphp: Slot [40] registered Dec 13 02:28:40.668480 kernel: acpiphp: Slot [41] registered Dec 13 02:28:40.668485 kernel: acpiphp: Slot [42] registered Dec 13 02:28:40.668491 kernel: acpiphp: Slot [43] registered Dec 13 02:28:40.668497 kernel: acpiphp: Slot [44] registered Dec 13 02:28:40.668502 kernel: acpiphp: Slot [45] registered Dec 13 02:28:40.668508 kernel: acpiphp: Slot [46] registered Dec 13 02:28:40.668514 kernel: acpiphp: Slot [47] registered Dec 13 02:28:40.668520 kernel: acpiphp: Slot [48] registered Dec 13 02:28:40.668526 kernel: acpiphp: Slot [49] registered Dec 13 02:28:40.668531 kernel: acpiphp: Slot [50] registered Dec 13 02:28:40.668537 kernel: acpiphp: Slot [51] registered Dec 13 02:28:40.668542 kernel: acpiphp: Slot [52] registered Dec 13 02:28:40.668548 kernel: acpiphp: Slot [53] registered Dec 13 02:28:40.668553 kernel: acpiphp: Slot [54] registered Dec 13 02:28:40.668559 kernel: acpiphp: Slot [55] registered Dec 13 02:28:40.668564 kernel: acpiphp: Slot [56] registered Dec 13 02:28:40.668571 kernel: acpiphp: Slot [57] registered Dec 13 02:28:40.668577 kernel: acpiphp: Slot [58] registered Dec 13 02:28:40.668582 kernel: acpiphp: Slot [59] registered Dec 13 02:28:40.668588 kernel: acpiphp: Slot [60] registered Dec 13 02:28:40.668594 kernel: acpiphp: Slot [61] registered Dec 13 02:28:40.668599 kernel: acpiphp: Slot [62] registered Dec 13 02:28:40.668605 kernel: acpiphp: Slot [63] registered Dec 13 02:28:40.668649 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Dec 13 02:28:40.668695 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Dec 13 02:28:40.668751 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Dec 13 02:28:40.668795 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 02:28:40.668846 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Dec 13 02:28:40.668892 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000cffff window] (subtractive decode) Dec 13 02:28:40.668936 kernel: pci 0000:00:11.0: bridge window [mem 0x000d0000-0x000d3fff window] (subtractive decode) Dec 13 02:28:40.668980 kernel: pci 0000:00:11.0: bridge window [mem 0x000d4000-0x000d7fff window] (subtractive decode) Dec 13 02:28:40.669026 kernel: pci 0000:00:11.0: bridge window [mem 0x000d8000-0x000dbfff window] (subtractive decode) Dec 13 02:28:40.669072 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Dec 13 02:28:40.669117 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Dec 13 02:28:40.669161 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Dec 13 02:28:40.669213 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Dec 13 02:28:40.669260 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Dec 13 02:28:40.669307 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Dec 13 02:28:40.669352 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Dec 13 02:28:40.669400 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Dec 13 02:28:40.669446 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Dec 13 02:28:40.669492 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Dec 13 02:28:40.669537 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Dec 13 02:28:40.669581 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Dec 13 02:28:40.669626 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Dec 13 02:28:40.669671 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Dec 13 02:28:40.669722 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Dec 13 02:28:40.669772 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 02:28:40.669818 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Dec 13 02:28:40.669874 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Dec 13 02:28:40.669920 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Dec 13 02:28:40.669965 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 02:28:40.670011 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Dec 13 02:28:40.670056 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Dec 13 02:28:40.670103 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 02:28:40.670149 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Dec 13 02:28:40.670194 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Dec 13 02:28:40.670239 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 02:28:40.670284 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Dec 13 02:28:40.670330 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Dec 13 02:28:40.670374 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 02:28:40.670420 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Dec 13 02:28:40.670464 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Dec 13 02:28:40.670509 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 02:28:40.670554 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Dec 13 02:28:40.670599 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Dec 13 02:28:40.670644 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 02:28:40.670700 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Dec 13 02:28:40.670753 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Dec 13 02:28:40.670799 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Dec 13 02:28:40.670853 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Dec 13 02:28:40.670917 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Dec 13 02:28:40.670965 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Dec 13 02:28:40.671011 kernel: pci 0000:0b:00.0: supports D1 D2 Dec 13 02:28:40.671060 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 02:28:40.671106 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Dec 13 02:28:40.671152 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Dec 13 02:28:40.671197 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Dec 13 02:28:40.671242 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Dec 13 02:28:40.671289 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Dec 13 02:28:40.671334 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Dec 13 02:28:40.671378 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Dec 13 02:28:40.671424 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 02:28:40.671470 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Dec 13 02:28:40.671514 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Dec 13 02:28:40.671559 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Dec 13 02:28:40.671603 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 02:28:40.671667 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Dec 13 02:28:40.671727 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Dec 13 02:28:40.671795 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 02:28:40.671866 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Dec 13 02:28:40.671932 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Dec 13 02:28:40.672000 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 02:28:40.672058 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Dec 13 02:28:40.672121 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Dec 13 02:28:40.672192 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 02:28:40.672255 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Dec 13 02:28:40.672311 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Dec 13 02:28:40.672357 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 02:28:40.672402 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Dec 13 02:28:40.672447 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Dec 13 02:28:40.672492 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 02:28:40.672539 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Dec 13 02:28:40.672583 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Dec 13 02:28:40.672628 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Dec 13 02:28:40.672672 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 02:28:40.672721 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Dec 13 02:28:40.672775 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Dec 13 02:28:40.672821 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Dec 13 02:28:40.672880 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 02:28:40.672929 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Dec 13 02:28:40.672974 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Dec 13 02:28:40.673019 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Dec 13 02:28:40.673066 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 02:28:40.673113 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Dec 13 02:28:40.681548 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Dec 13 02:28:40.681615 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 02:28:40.681666 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Dec 13 02:28:40.681719 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Dec 13 02:28:40.681787 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 02:28:40.681846 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Dec 13 02:28:40.681901 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Dec 13 02:28:40.681948 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 02:28:40.681995 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Dec 13 02:28:40.682041 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Dec 13 02:28:40.682085 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 02:28:40.682133 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Dec 13 02:28:40.682178 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Dec 13 02:28:40.682222 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 02:28:40.682270 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Dec 13 02:28:40.682315 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Dec 13 02:28:40.682360 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Dec 13 02:28:40.682405 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 02:28:40.682452 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Dec 13 02:28:40.682497 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Dec 13 02:28:40.682541 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Dec 13 02:28:40.682586 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 02:28:40.682636 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Dec 13 02:28:40.682681 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Dec 13 02:28:40.682726 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 02:28:40.682772 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Dec 13 02:28:40.682826 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Dec 13 02:28:40.682880 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 02:28:40.682927 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Dec 13 02:28:40.682974 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Dec 13 02:28:40.683019 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 02:28:40.683067 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Dec 13 02:28:40.683111 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Dec 13 02:28:40.683156 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 02:28:40.683203 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Dec 13 02:28:40.683247 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Dec 13 02:28:40.683292 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 02:28:40.683341 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Dec 13 02:28:40.683387 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Dec 13 02:28:40.683432 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 02:28:40.683440 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Dec 13 02:28:40.683446 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Dec 13 02:28:40.683452 kernel: ACPI: PCI: Interrupt link LNKB disabled Dec 13 02:28:40.683458 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 02:28:40.683464 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Dec 13 02:28:40.683470 kernel: iommu: Default domain type: Translated Dec 13 02:28:40.683477 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 02:28:40.683523 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Dec 13 02:28:40.683568 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 02:28:40.683613 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Dec 13 02:28:40.683622 kernel: vgaarb: loaded Dec 13 02:28:40.683628 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 02:28:40.683634 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 02:28:40.683640 kernel: PTP clock support registered Dec 13 02:28:40.683645 kernel: PCI: Using ACPI for IRQ routing Dec 13 02:28:40.683652 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 02:28:40.683658 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Dec 13 02:28:40.683664 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Dec 13 02:28:40.683669 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Dec 13 02:28:40.683675 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Dec 13 02:28:40.683681 kernel: clocksource: Switched to clocksource tsc-early Dec 13 02:28:40.683687 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 02:28:40.683693 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 02:28:40.683698 kernel: pnp: PnP ACPI init Dec 13 02:28:40.683748 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Dec 13 02:28:40.683790 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Dec 13 02:28:40.683848 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Dec 13 02:28:40.683902 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Dec 13 02:28:40.683948 kernel: pnp 00:06: [dma 2] Dec 13 02:28:40.683992 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Dec 13 02:28:40.684037 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Dec 13 02:28:40.684078 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Dec 13 02:28:40.684086 kernel: pnp: PnP ACPI: found 8 devices Dec 13 02:28:40.684092 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 02:28:40.684098 kernel: NET: Registered PF_INET protocol family Dec 13 02:28:40.684104 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 02:28:40.684110 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 02:28:40.684115 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 02:28:40.684123 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 02:28:40.684129 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 02:28:40.684135 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 02:28:40.684140 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 02:28:40.684146 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 02:28:40.684152 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 02:28:40.684158 kernel: NET: Registered PF_XDP protocol family Dec 13 02:28:40.684206 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Dec 13 02:28:40.684255 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Dec 13 02:28:40.684306 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Dec 13 02:28:40.684354 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Dec 13 02:28:40.684402 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Dec 13 02:28:40.684450 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Dec 13 02:28:40.684499 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Dec 13 02:28:40.684548 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Dec 13 02:28:40.684595 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Dec 13 02:28:40.684642 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Dec 13 02:28:40.684691 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Dec 13 02:28:40.684737 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Dec 13 02:28:40.684784 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Dec 13 02:28:40.684841 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Dec 13 02:28:40.684896 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Dec 13 02:28:40.684943 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Dec 13 02:28:40.684988 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Dec 13 02:28:40.685040 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Dec 13 02:28:40.685108 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Dec 13 02:28:40.685163 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Dec 13 02:28:40.685210 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Dec 13 02:28:40.685256 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Dec 13 02:28:40.685301 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Dec 13 02:28:40.685347 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 02:28:40.685393 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 02:28:40.685440 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.685486 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.685532 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.685578 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.685624 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.685670 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.685715 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.685759 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.685806 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.685863 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.685911 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.685956 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.686002 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.686047 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.686094 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.686139 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.686187 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.686233 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.686278 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.686323 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.686369 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.686415 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.686461 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.686505 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.686552 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.686597 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.686642 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.686688 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.686733 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.686779 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.686824 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.686889 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.686939 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.686985 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.687030 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.687076 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.687122 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.687168 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.687213 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.687258 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.687306 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.687351 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.687397 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.687442 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.687489 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.687533 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.687579 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.687623 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.687668 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.687713 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.687760 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.687804 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.692456 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.692520 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.692571 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.692638 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.692689 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.692735 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.692784 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.692990 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.693043 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.693093 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.693141 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.693201 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.693276 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.693351 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.693422 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.693488 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.693557 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.693627 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.693696 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.693762 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.693831 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.693907 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.693975 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.694045 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.694114 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.694181 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.694253 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.694321 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.694388 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.694455 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.694523 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Dec 13 02:28:40.694589 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:28:40.694656 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 02:28:40.694724 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Dec 13 02:28:40.694790 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Dec 13 02:28:40.694865 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Dec 13 02:28:40.694935 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 02:28:40.695008 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Dec 13 02:28:40.695076 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Dec 13 02:28:40.695145 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Dec 13 02:28:40.695216 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Dec 13 02:28:40.695284 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 02:28:40.695353 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Dec 13 02:28:40.695422 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Dec 13 02:28:40.695489 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Dec 13 02:28:40.695556 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 02:28:40.695624 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Dec 13 02:28:40.695691 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Dec 13 02:28:40.695758 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Dec 13 02:28:40.695824 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 02:28:40.699763 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Dec 13 02:28:40.699854 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Dec 13 02:28:40.699933 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 02:28:40.700016 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Dec 13 02:28:40.700094 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Dec 13 02:28:40.700169 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 02:28:40.700245 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Dec 13 02:28:40.700321 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Dec 13 02:28:40.700396 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 02:28:40.700473 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Dec 13 02:28:40.700549 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Dec 13 02:28:40.700624 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 02:28:40.700700 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Dec 13 02:28:40.700776 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Dec 13 02:28:40.700863 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 02:28:40.700959 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Dec 13 02:28:40.701037 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Dec 13 02:28:40.701115 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Dec 13 02:28:40.701195 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Dec 13 02:28:40.701272 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 02:28:40.701351 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Dec 13 02:28:40.701429 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Dec 13 02:28:40.701506 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Dec 13 02:28:40.701582 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 02:28:40.701660 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Dec 13 02:28:40.701738 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Dec 13 02:28:40.701813 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Dec 13 02:28:40.701905 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 02:28:40.701980 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Dec 13 02:28:40.702055 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Dec 13 02:28:40.702130 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 02:28:40.702204 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Dec 13 02:28:40.702278 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Dec 13 02:28:40.702352 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 02:28:40.702429 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Dec 13 02:28:40.702503 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Dec 13 02:28:40.702577 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 02:28:40.702656 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Dec 13 02:28:40.702731 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Dec 13 02:28:40.702806 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 02:28:40.702888 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Dec 13 02:28:40.702964 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Dec 13 02:28:40.703038 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 02:28:40.703112 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Dec 13 02:28:40.703185 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Dec 13 02:28:40.703263 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Dec 13 02:28:40.703340 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 02:28:40.703414 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Dec 13 02:28:40.703486 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Dec 13 02:28:40.703558 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Dec 13 02:28:40.703631 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 02:28:40.703704 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Dec 13 02:28:40.703777 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Dec 13 02:28:40.703860 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Dec 13 02:28:40.703945 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 02:28:40.704019 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Dec 13 02:28:40.704095 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Dec 13 02:28:40.704169 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 02:28:40.704245 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Dec 13 02:28:40.704319 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Dec 13 02:28:40.704393 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 02:28:40.704468 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Dec 13 02:28:40.704542 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Dec 13 02:28:40.704615 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 02:28:40.704689 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Dec 13 02:28:40.704766 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Dec 13 02:28:40.704850 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 02:28:40.704928 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Dec 13 02:28:40.705001 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Dec 13 02:28:40.705073 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 02:28:40.705147 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Dec 13 02:28:40.705219 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Dec 13 02:28:40.705291 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Dec 13 02:28:40.705363 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 02:28:40.705435 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Dec 13 02:28:40.705510 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Dec 13 02:28:40.705582 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Dec 13 02:28:40.705654 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 02:28:40.705727 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Dec 13 02:28:40.705800 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Dec 13 02:28:40.710923 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 02:28:40.711017 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Dec 13 02:28:40.711101 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Dec 13 02:28:40.711182 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 02:28:40.711267 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Dec 13 02:28:40.711347 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Dec 13 02:28:40.711427 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 02:28:40.711507 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Dec 13 02:28:40.711584 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Dec 13 02:28:40.711662 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 02:28:40.711743 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Dec 13 02:28:40.711822 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Dec 13 02:28:40.714940 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 02:28:40.715029 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Dec 13 02:28:40.715113 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Dec 13 02:28:40.715196 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 02:28:40.715271 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Dec 13 02:28:40.715340 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000cffff window] Dec 13 02:28:40.715409 kernel: pci_bus 0000:00: resource 6 [mem 0x000d0000-0x000d3fff window] Dec 13 02:28:40.715480 kernel: pci_bus 0000:00: resource 7 [mem 0x000d4000-0x000d7fff window] Dec 13 02:28:40.715548 kernel: pci_bus 0000:00: resource 8 [mem 0x000d8000-0x000dbfff window] Dec 13 02:28:40.715618 kernel: pci_bus 0000:00: resource 9 [mem 0xc0000000-0xfebfffff window] Dec 13 02:28:40.715686 kernel: pci_bus 0000:00: resource 10 [io 0x0000-0x0cf7 window] Dec 13 02:28:40.715755 kernel: pci_bus 0000:00: resource 11 [io 0x0d00-0xfeff window] Dec 13 02:28:40.715830 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Dec 13 02:28:40.715953 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Dec 13 02:28:40.716025 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 02:28:40.716096 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Dec 13 02:28:40.716167 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000cffff window] Dec 13 02:28:40.716242 kernel: pci_bus 0000:02: resource 6 [mem 0x000d0000-0x000d3fff window] Dec 13 02:28:40.716313 kernel: pci_bus 0000:02: resource 7 [mem 0x000d4000-0x000d7fff window] Dec 13 02:28:40.716381 kernel: pci_bus 0000:02: resource 8 [mem 0x000d8000-0x000dbfff window] Dec 13 02:28:40.716451 kernel: pci_bus 0000:02: resource 9 [mem 0xc0000000-0xfebfffff window] Dec 13 02:28:40.716521 kernel: pci_bus 0000:02: resource 10 [io 0x0000-0x0cf7 window] Dec 13 02:28:40.716591 kernel: pci_bus 0000:02: resource 11 [io 0x0d00-0xfeff window] Dec 13 02:28:40.716672 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Dec 13 02:28:40.716746 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Dec 13 02:28:40.716817 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 02:28:40.716910 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Dec 13 02:28:40.716982 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Dec 13 02:28:40.717054 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 02:28:40.717133 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Dec 13 02:28:40.717206 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Dec 13 02:28:40.717282 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 02:28:40.717360 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Dec 13 02:28:40.717434 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 02:28:40.717515 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Dec 13 02:28:40.717599 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 02:28:40.717681 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Dec 13 02:28:40.717757 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 02:28:40.719854 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Dec 13 02:28:40.719946 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 02:28:40.720032 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Dec 13 02:28:40.720106 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 02:28:40.720178 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Dec 13 02:28:40.720248 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Dec 13 02:28:40.720313 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 02:28:40.720383 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Dec 13 02:28:40.720454 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Dec 13 02:28:40.720521 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 02:28:40.720591 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Dec 13 02:28:40.720661 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Dec 13 02:28:40.720722 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 02:28:40.720791 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Dec 13 02:28:40.720907 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 02:28:40.720977 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Dec 13 02:28:40.721041 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 02:28:40.721110 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Dec 13 02:28:40.721175 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 02:28:40.721242 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Dec 13 02:28:40.721305 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 02:28:40.721374 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Dec 13 02:28:40.721436 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 02:28:40.721504 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Dec 13 02:28:40.721569 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Dec 13 02:28:40.721630 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 02:28:40.721697 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Dec 13 02:28:40.721760 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Dec 13 02:28:40.721821 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 02:28:40.723925 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Dec 13 02:28:40.723998 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Dec 13 02:28:40.724069 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 02:28:40.724148 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Dec 13 02:28:40.724218 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 02:28:40.724289 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Dec 13 02:28:40.724354 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 02:28:40.724426 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Dec 13 02:28:40.724492 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 02:28:40.724563 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Dec 13 02:28:40.724628 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 02:28:40.724695 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Dec 13 02:28:40.724758 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 02:28:40.724827 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Dec 13 02:28:40.724945 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Dec 13 02:28:40.725009 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 02:28:40.725081 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Dec 13 02:28:40.725145 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Dec 13 02:28:40.725209 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 02:28:40.725283 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Dec 13 02:28:40.725358 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 02:28:40.725434 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Dec 13 02:28:40.725506 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 02:28:40.725582 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Dec 13 02:28:40.725652 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 02:28:40.725727 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Dec 13 02:28:40.725797 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 02:28:40.729667 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Dec 13 02:28:40.729753 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 02:28:40.729890 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Dec 13 02:28:40.729968 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 02:28:40.730049 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 02:28:40.730064 kernel: PCI: CLS 32 bytes, default 64 Dec 13 02:28:40.730077 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 02:28:40.730089 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Dec 13 02:28:40.730100 kernel: clocksource: Switched to clocksource tsc Dec 13 02:28:40.730111 kernel: Initialise system trusted keyrings Dec 13 02:28:40.730120 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 02:28:40.730130 kernel: Key type asymmetric registered Dec 13 02:28:40.730139 kernel: Asymmetric key parser 'x509' registered Dec 13 02:28:40.730148 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 02:28:40.730158 kernel: io scheduler mq-deadline registered Dec 13 02:28:40.730171 kernel: io scheduler kyber registered Dec 13 02:28:40.730182 kernel: io scheduler bfq registered Dec 13 02:28:40.730262 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Dec 13 02:28:40.730340 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.730418 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Dec 13 02:28:40.730494 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.730576 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Dec 13 02:28:40.730656 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.730740 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Dec 13 02:28:40.730820 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.730925 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Dec 13 02:28:40.731004 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.731083 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Dec 13 02:28:40.731161 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.731244 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Dec 13 02:28:40.731322 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.731401 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Dec 13 02:28:40.731478 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.731558 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Dec 13 02:28:40.731637 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.731715 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Dec 13 02:28:40.731792 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.731878 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Dec 13 02:28:40.731955 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.732086 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Dec 13 02:28:40.732144 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.732199 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Dec 13 02:28:40.732246 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.732293 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Dec 13 02:28:40.732340 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.732388 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Dec 13 02:28:40.732437 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.732484 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Dec 13 02:28:40.732530 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.732577 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Dec 13 02:28:40.732623 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.732670 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Dec 13 02:28:40.732718 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.732765 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Dec 13 02:28:40.732811 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.734879 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Dec 13 02:28:40.734937 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.734987 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Dec 13 02:28:40.735038 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.735086 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Dec 13 02:28:40.735133 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.735179 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Dec 13 02:28:40.735225 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.735272 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Dec 13 02:28:40.735320 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.735367 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Dec 13 02:28:40.735413 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.735459 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Dec 13 02:28:40.735506 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.735551 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Dec 13 02:28:40.735600 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.735646 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Dec 13 02:28:40.735693 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.735740 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Dec 13 02:28:40.735787 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.735841 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Dec 13 02:28:40.735893 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.735947 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Dec 13 02:28:40.735994 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.736040 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Dec 13 02:28:40.736086 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:28:40.736096 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 02:28:40.736103 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 02:28:40.736110 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 02:28:40.736117 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Dec 13 02:28:40.736124 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 02:28:40.736130 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 02:28:40.736178 kernel: rtc_cmos 00:01: registered as rtc0 Dec 13 02:28:40.736223 kernel: rtc_cmos 00:01: setting system clock to 2024-12-13T02:28:40 UTC (1734056920) Dec 13 02:28:40.736265 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Dec 13 02:28:40.736273 kernel: fail to initialize ptp_kvm Dec 13 02:28:40.736280 kernel: intel_pstate: CPU model not supported Dec 13 02:28:40.736286 kernel: NET: Registered PF_INET6 protocol family Dec 13 02:28:40.736292 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 02:28:40.736298 kernel: Segment Routing with IPv6 Dec 13 02:28:40.736304 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 02:28:40.736310 kernel: NET: Registered PF_PACKET protocol family Dec 13 02:28:40.736318 kernel: Key type dns_resolver registered Dec 13 02:28:40.736326 kernel: IPI shorthand broadcast: enabled Dec 13 02:28:40.736332 kernel: sched_clock: Marking stable (862053693, 222295639)->(1152342764, -67993432) Dec 13 02:28:40.736338 kernel: registered taskstats version 1 Dec 13 02:28:40.736344 kernel: Loading compiled-in X.509 certificates Dec 13 02:28:40.736350 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 02:28:40.736356 kernel: Key type .fscrypt registered Dec 13 02:28:40.736362 kernel: Key type fscrypt-provisioning registered Dec 13 02:28:40.736369 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 02:28:40.736375 kernel: ima: Allocated hash algorithm: sha1 Dec 13 02:28:40.736381 kernel: ima: No architecture policies found Dec 13 02:28:40.736387 kernel: clk: Disabling unused clocks Dec 13 02:28:40.736393 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 02:28:40.736399 kernel: Write protecting the kernel read-only data: 28672k Dec 13 02:28:40.736406 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 02:28:40.736412 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 02:28:40.736418 kernel: Run /init as init process Dec 13 02:28:40.736425 kernel: with arguments: Dec 13 02:28:40.736431 kernel: /init Dec 13 02:28:40.736437 kernel: with environment: Dec 13 02:28:40.736443 kernel: HOME=/ Dec 13 02:28:40.736449 kernel: TERM=linux Dec 13 02:28:40.736455 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 02:28:40.736462 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:28:40.736470 systemd[1]: Detected virtualization vmware. Dec 13 02:28:40.736476 systemd[1]: Detected architecture x86-64. Dec 13 02:28:40.736483 systemd[1]: Running in initrd. Dec 13 02:28:40.736489 systemd[1]: No hostname configured, using default hostname. Dec 13 02:28:40.736495 systemd[1]: Hostname set to . Dec 13 02:28:40.736501 systemd[1]: Initializing machine ID from random generator. Dec 13 02:28:40.736507 systemd[1]: Queued start job for default target initrd.target. Dec 13 02:28:40.736514 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:28:40.736520 systemd[1]: Reached target cryptsetup.target. Dec 13 02:28:40.736526 systemd[1]: Reached target paths.target. Dec 13 02:28:40.736533 systemd[1]: Reached target slices.target. Dec 13 02:28:40.736539 systemd[1]: Reached target swap.target. Dec 13 02:28:40.736545 systemd[1]: Reached target timers.target. Dec 13 02:28:40.736552 systemd[1]: Listening on iscsid.socket. Dec 13 02:28:40.736558 systemd[1]: Listening on iscsiuio.socket. Dec 13 02:28:40.736564 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 02:28:40.736570 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 02:28:40.736577 systemd[1]: Listening on systemd-journald.socket. Dec 13 02:28:40.736584 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:28:40.736590 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:28:40.736596 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:28:40.736602 systemd[1]: Reached target sockets.target. Dec 13 02:28:40.736608 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:28:40.736615 systemd[1]: Finished network-cleanup.service. Dec 13 02:28:40.736622 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 02:28:40.736628 systemd[1]: Starting systemd-journald.service... Dec 13 02:28:40.736635 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:28:40.736641 systemd[1]: Starting systemd-resolved.service... Dec 13 02:28:40.736648 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 02:28:40.736654 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:28:40.736660 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 02:28:40.736667 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:28:40.736673 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:28:40.736680 kernel: audit: type=1130 audit(1734056920.661:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:40.736686 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 02:28:40.736693 kernel: audit: type=1130 audit(1734056920.666:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:40.736700 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 02:28:40.736706 systemd[1]: Started systemd-resolved.service. Dec 13 02:28:40.736712 systemd[1]: Reached target nss-lookup.target. Dec 13 02:28:40.736718 kernel: audit: type=1130 audit(1734056920.679:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:40.736725 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 02:28:40.736731 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 02:28:40.736737 kernel: audit: type=1130 audit(1734056920.690:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:40.736745 systemd[1]: Starting dracut-cmdline.service... Dec 13 02:28:40.736751 kernel: Bridge firewalling registered Dec 13 02:28:40.736757 kernel: SCSI subsystem initialized Dec 13 02:28:40.736767 systemd-journald[216]: Journal started Dec 13 02:28:40.736801 systemd-journald[216]: Runtime Journal (/run/log/journal/95456148c8584b619b68573dbd578fe5) is 4.8M, max 38.8M, 34.0M free. Dec 13 02:28:40.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:40.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:40.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:40.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:40.655403 systemd-modules-load[217]: Inserted module 'overlay' Dec 13 02:28:40.739976 systemd[1]: Started systemd-journald.service. Dec 13 02:28:40.678099 systemd-resolved[218]: Positive Trust Anchors: Dec 13 02:28:40.745519 kernel: audit: type=1130 audit(1734056920.738:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:40.745535 kernel: Loading iSCSI transport class v2.0-870. Dec 13 02:28:40.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:40.678107 systemd-resolved[218]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:28:40.678126 systemd-resolved[218]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:28:40.749306 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 02:28:40.749319 kernel: device-mapper: uevent: version 1.0.3 Dec 13 02:28:40.749327 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 02:28:40.679782 systemd-resolved[218]: Defaulting to hostname 'linux'. Dec 13 02:28:40.707462 systemd-modules-load[217]: Inserted module 'br_netfilter' Dec 13 02:28:40.749758 dracut-cmdline[232]: dracut-dracut-053 Dec 13 02:28:40.749758 dracut-cmdline[232]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Dec 13 02:28:40.749758 dracut-cmdline[232]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:28:40.755228 kernel: audit: type=1130 audit(1734056920.749:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:40.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:40.751334 systemd-modules-load[217]: Inserted module 'dm_multipath' Dec 13 02:28:40.751687 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:28:40.752205 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:28:40.759554 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:28:40.762083 kernel: audit: type=1130 audit(1734056920.757:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:40.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:40.766872 kernel: iscsi: registered transport (tcp) Dec 13 02:28:40.781851 kernel: iscsi: registered transport (qla4xxx) Dec 13 02:28:40.781879 kernel: QLogic iSCSI HBA Driver Dec 13 02:28:40.800431 systemd[1]: Finished dracut-cmdline.service. Dec 13 02:28:40.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:40.801284 systemd[1]: Starting dracut-pre-udev.service... Dec 13 02:28:40.804850 kernel: audit: type=1130 audit(1734056920.798:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:40.839871 kernel: raid6: avx2x4 gen() 43429 MB/s Dec 13 02:28:40.856855 kernel: raid6: avx2x4 xor() 14296 MB/s Dec 13 02:28:40.873857 kernel: raid6: avx2x2 gen() 50377 MB/s Dec 13 02:28:40.890860 kernel: raid6: avx2x2 xor() 31716 MB/s Dec 13 02:28:40.907854 kernel: raid6: avx2x1 gen() 43795 MB/s Dec 13 02:28:40.924850 kernel: raid6: avx2x1 xor() 27560 MB/s Dec 13 02:28:40.941852 kernel: raid6: sse2x4 gen() 19921 MB/s Dec 13 02:28:40.958853 kernel: raid6: sse2x4 xor() 11600 MB/s Dec 13 02:28:40.975855 kernel: raid6: sse2x2 gen() 21254 MB/s Dec 13 02:28:40.992850 kernel: raid6: sse2x2 xor() 13300 MB/s Dec 13 02:28:41.009849 kernel: raid6: sse2x1 gen() 18029 MB/s Dec 13 02:28:41.027041 kernel: raid6: sse2x1 xor() 8879 MB/s Dec 13 02:28:41.027079 kernel: raid6: using algorithm avx2x2 gen() 50377 MB/s Dec 13 02:28:41.027090 kernel: raid6: .... xor() 31716 MB/s, rmw enabled Dec 13 02:28:41.028222 kernel: raid6: using avx2x2 recovery algorithm Dec 13 02:28:41.036858 kernel: xor: automatically using best checksumming function avx Dec 13 02:28:41.097889 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 02:28:41.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:41.103350 systemd[1]: Finished dracut-pre-udev.service. Dec 13 02:28:41.101000 audit: BPF prog-id=7 op=LOAD Dec 13 02:28:41.102000 audit: BPF prog-id=8 op=LOAD Dec 13 02:28:41.104176 systemd[1]: Starting systemd-udevd.service... Dec 13 02:28:41.108859 kernel: audit: type=1130 audit(1734056921.101:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:41.115299 systemd-udevd[416]: Using default interface naming scheme 'v252'. Dec 13 02:28:41.118009 systemd[1]: Started systemd-udevd.service. Dec 13 02:28:41.118771 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 02:28:41.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:41.129754 dracut-pre-trigger[423]: rd.md=0: removing MD RAID activation Dec 13 02:28:41.149048 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 02:28:41.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:41.149796 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:28:41.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:41.232714 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:28:41.302851 kernel: VMware PVSCSI driver - version 1.0.7.0-k Dec 13 02:28:41.306040 kernel: vmw_pvscsi: using 64bit dma Dec 13 02:28:41.306076 kernel: vmw_pvscsi: max_id: 16 Dec 13 02:28:41.306088 kernel: vmw_pvscsi: setting ring_pages to 8 Dec 13 02:28:41.329161 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Dec 13 02:28:41.329206 kernel: vmw_pvscsi: enabling reqCallThreshold Dec 13 02:28:41.329221 kernel: vmw_pvscsi: driver-based request coalescing enabled Dec 13 02:28:41.329234 kernel: vmw_pvscsi: using MSI-X Dec 13 02:28:41.333852 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Dec 13 02:28:41.336217 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Dec 13 02:28:41.364354 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Dec 13 02:28:41.364460 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Dec 13 02:28:41.364548 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 02:28:41.364561 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Dec 13 02:28:41.364645 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 02:28:41.364656 kernel: AES CTR mode by8 optimization enabled Dec 13 02:28:41.364673 kernel: libata version 3.00 loaded. Dec 13 02:28:41.364683 kernel: ata_piix 0000:00:07.1: version 2.13 Dec 13 02:28:41.377489 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Dec 13 02:28:41.377562 kernel: scsi host1: ata_piix Dec 13 02:28:41.377624 kernel: scsi host2: ata_piix Dec 13 02:28:41.377680 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Dec 13 02:28:41.377689 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Dec 13 02:28:41.542862 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Dec 13 02:28:41.550036 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Dec 13 02:28:41.558165 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Dec 13 02:28:41.563265 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 02:28:41.563378 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Dec 13 02:28:41.563456 kernel: sd 0:0:0:0: [sda] Cache data unavailable Dec 13 02:28:41.563514 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Dec 13 02:28:41.563592 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:28:41.563605 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 02:28:41.591858 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Dec 13 02:28:41.608458 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 02:28:41.608480 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (476) Dec 13 02:28:41.608494 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 02:28:41.599136 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 02:28:41.602485 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 02:28:41.605313 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 02:28:41.605475 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 02:28:41.610196 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:28:41.611415 systemd[1]: Starting disk-uuid.service... Dec 13 02:28:41.641854 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:28:41.646853 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:28:42.651522 disk-uuid[548]: The operation has completed successfully. Dec 13 02:28:42.651848 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:28:42.704115 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 02:28:42.704172 systemd[1]: Finished disk-uuid.service. Dec 13 02:28:42.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:42.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:42.704760 systemd[1]: Starting verity-setup.service... Dec 13 02:28:42.714850 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 02:28:42.766329 systemd[1]: Found device dev-mapper-usr.device. Dec 13 02:28:42.766791 systemd[1]: Mounting sysusr-usr.mount... Dec 13 02:28:42.767170 systemd[1]: Finished verity-setup.service. Dec 13 02:28:42.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:42.821852 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:28:42.821442 systemd[1]: Mounted sysusr-usr.mount. Dec 13 02:28:42.822044 systemd[1]: Starting afterburn-network-kargs.service... Dec 13 02:28:42.822528 systemd[1]: Starting ignition-setup.service... Dec 13 02:28:42.839901 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:28:42.839927 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:28:42.839939 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:28:42.845848 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:28:42.859055 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 02:28:42.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:42.867729 systemd[1]: Finished ignition-setup.service. Dec 13 02:28:42.868454 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 02:28:42.934170 systemd[1]: Finished afterburn-network-kargs.service. Dec 13 02:28:42.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:42.934851 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 02:28:42.984879 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 02:28:42.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:42.983000 audit: BPF prog-id=9 op=LOAD Dec 13 02:28:42.985794 systemd[1]: Starting systemd-networkd.service... Dec 13 02:28:43.000227 systemd-networkd[734]: lo: Link UP Dec 13 02:28:43.000736 systemd-networkd[734]: lo: Gained carrier Dec 13 02:28:43.001158 systemd-networkd[734]: Enumeration completed Dec 13 02:28:43.001331 systemd[1]: Started systemd-networkd.service. Dec 13 02:28:42.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:43.001495 systemd[1]: Reached target network.target. Dec 13 02:28:43.001803 systemd-networkd[734]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Dec 13 02:28:43.002121 systemd[1]: Starting iscsiuio.service... Dec 13 02:28:43.005358 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Dec 13 02:28:43.005490 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Dec 13 02:28:43.005821 systemd[1]: Started iscsiuio.service. Dec 13 02:28:43.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:43.006306 systemd-networkd[734]: ens192: Link UP Dec 13 02:28:43.006422 systemd[1]: Starting iscsid.service... Dec 13 02:28:43.006445 systemd-networkd[734]: ens192: Gained carrier Dec 13 02:28:43.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:43.009794 iscsid[739]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:28:43.009794 iscsid[739]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 02:28:43.009794 iscsid[739]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 02:28:43.009794 iscsid[739]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 02:28:43.009794 iscsid[739]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:28:43.009794 iscsid[739]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 02:28:43.009452 systemd[1]: Started iscsid.service. Dec 13 02:28:43.010074 systemd[1]: Starting dracut-initqueue.service... Dec 13 02:28:43.018633 systemd[1]: Finished dracut-initqueue.service. Dec 13 02:28:43.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:43.018793 systemd[1]: Reached target remote-fs-pre.target. Dec 13 02:28:43.018904 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:28:43.019418 systemd[1]: Reached target remote-fs.target. Dec 13 02:28:43.019953 systemd[1]: Starting dracut-pre-mount.service... Dec 13 02:28:43.025154 systemd[1]: Finished dracut-pre-mount.service. Dec 13 02:28:43.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:43.030347 ignition[606]: Ignition 2.14.0 Dec 13 02:28:43.030356 ignition[606]: Stage: fetch-offline Dec 13 02:28:43.030385 ignition[606]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:28:43.030399 ignition[606]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:28:43.033095 ignition[606]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:28:43.033165 ignition[606]: parsed url from cmdline: "" Dec 13 02:28:43.033167 ignition[606]: no config URL provided Dec 13 02:28:43.033170 ignition[606]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:28:43.033174 ignition[606]: no config at "/usr/lib/ignition/user.ign" Dec 13 02:28:43.037919 ignition[606]: config successfully fetched Dec 13 02:28:43.037939 ignition[606]: parsing config with SHA512: f304b09d7f1f0f520ee96d74e16a6cf99befcd2a991adc81b34e8b937137e73ef4457e52d4d5a7d61e02734ce43f985143884d924c7f9203f4c46b6e1b9898d4 Dec 13 02:28:43.042059 unknown[606]: fetched base config from "system" Dec 13 02:28:43.042066 unknown[606]: fetched user config from "vmware" Dec 13 02:28:43.042353 ignition[606]: fetch-offline: fetch-offline passed Dec 13 02:28:43.042390 ignition[606]: Ignition finished successfully Dec 13 02:28:43.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:43.043203 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 02:28:43.043352 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 02:28:43.043804 systemd[1]: Starting ignition-kargs.service... Dec 13 02:28:43.049202 ignition[754]: Ignition 2.14.0 Dec 13 02:28:43.049453 ignition[754]: Stage: kargs Dec 13 02:28:43.049622 ignition[754]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:28:43.049770 ignition[754]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:28:43.050938 ignition[754]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:28:43.051978 ignition[754]: kargs: kargs passed Dec 13 02:28:43.052340 ignition[754]: Ignition finished successfully Dec 13 02:28:43.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:43.053225 systemd[1]: Finished ignition-kargs.service. Dec 13 02:28:43.053795 systemd[1]: Starting ignition-disks.service... Dec 13 02:28:43.058487 ignition[760]: Ignition 2.14.0 Dec 13 02:28:43.058496 ignition[760]: Stage: disks Dec 13 02:28:43.058575 ignition[760]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:28:43.058584 ignition[760]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:28:43.059816 ignition[760]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:28:43.061177 ignition[760]: disks: disks passed Dec 13 02:28:43.061207 ignition[760]: Ignition finished successfully Dec 13 02:28:43.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:43.061823 systemd[1]: Finished ignition-disks.service. Dec 13 02:28:43.061985 systemd[1]: Reached target initrd-root-device.target. Dec 13 02:28:43.062078 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:28:43.062161 systemd[1]: Reached target local-fs.target. Dec 13 02:28:43.062241 systemd[1]: Reached target sysinit.target. Dec 13 02:28:43.062319 systemd[1]: Reached target basic.target. Dec 13 02:28:43.062903 systemd[1]: Starting systemd-fsck-root.service... Dec 13 02:28:43.075472 systemd-fsck[768]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 02:28:43.077183 systemd[1]: Finished systemd-fsck-root.service. Dec 13 02:28:43.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:43.077781 systemd[1]: Mounting sysroot.mount... Dec 13 02:28:43.084572 systemd[1]: Mounted sysroot.mount. Dec 13 02:28:43.084707 systemd[1]: Reached target initrd-root-fs.target. Dec 13 02:28:43.084928 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:28:43.085641 systemd[1]: Mounting sysroot-usr.mount... Dec 13 02:28:43.086001 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 02:28:43.086028 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 02:28:43.086045 systemd[1]: Reached target ignition-diskful.target. Dec 13 02:28:43.087774 systemd[1]: Mounted sysroot-usr.mount. Dec 13 02:28:43.088387 systemd[1]: Starting initrd-setup-root.service... Dec 13 02:28:43.091693 initrd-setup-root[778]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 02:28:43.095909 initrd-setup-root[786]: cut: /sysroot/etc/group: No such file or directory Dec 13 02:28:43.097682 initrd-setup-root[794]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 02:28:43.099891 initrd-setup-root[802]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 02:28:43.130989 systemd[1]: Finished initrd-setup-root.service. Dec 13 02:28:43.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:43.131576 systemd[1]: Starting ignition-mount.service... Dec 13 02:28:43.132033 systemd[1]: Starting sysroot-boot.service... Dec 13 02:28:43.135577 bash[819]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 02:28:43.141743 ignition[820]: INFO : Ignition 2.14.0 Dec 13 02:28:43.141743 ignition[820]: INFO : Stage: mount Dec 13 02:28:43.141743 ignition[820]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:28:43.142221 ignition[820]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:28:43.145388 ignition[820]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:28:43.148458 ignition[820]: INFO : mount: mount passed Dec 13 02:28:43.148458 ignition[820]: INFO : Ignition finished successfully Dec 13 02:28:43.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:43.149159 systemd[1]: Finished ignition-mount.service. Dec 13 02:28:43.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:43.151916 systemd[1]: Finished sysroot-boot.service. Dec 13 02:28:43.308092 systemd-resolved[218]: Detected conflict on linux IN A 139.178.70.105 Dec 13 02:28:43.308103 systemd-resolved[218]: Hostname conflict, changing published hostname from 'linux' to 'linux4'. Dec 13 02:28:43.782729 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:28:43.796854 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (829) Dec 13 02:28:43.799226 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:28:43.799247 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:28:43.799255 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:28:43.806858 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:28:43.808805 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:28:43.809448 systemd[1]: Starting ignition-files.service... Dec 13 02:28:43.820255 ignition[849]: INFO : Ignition 2.14.0 Dec 13 02:28:43.820255 ignition[849]: INFO : Stage: files Dec 13 02:28:43.820626 ignition[849]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:28:43.820626 ignition[849]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:28:43.822347 ignition[849]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:28:43.824602 ignition[849]: DEBUG : files: compiled without relabeling support, skipping Dec 13 02:28:43.825106 ignition[849]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 02:28:43.825106 ignition[849]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 02:28:43.829690 ignition[849]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 02:28:43.830050 ignition[849]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 02:28:43.830688 unknown[849]: wrote ssh authorized keys file for user: core Dec 13 02:28:43.831172 ignition[849]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 02:28:43.832074 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:28:43.832074 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 02:28:43.996118 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 02:28:44.090955 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:28:44.091227 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 02:28:44.091524 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 02:28:44.091718 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:28:44.091978 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:28:44.092167 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:28:44.092403 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:28:44.092593 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:28:44.092827 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:28:44.100800 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:28:44.101109 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:28:44.101358 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 02:28:44.101705 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 02:28:44.107573 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Dec 13 02:28:44.107878 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:28:44.112946 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2324701831" Dec 13 02:28:44.113241 ignition[849]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2324701831": device or resource busy Dec 13 02:28:44.113543 ignition[849]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2324701831", trying btrfs: device or resource busy Dec 13 02:28:44.113861 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2324701831" Dec 13 02:28:44.115851 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (854) Dec 13 02:28:44.118093 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2324701831" Dec 13 02:28:44.118525 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2324701831" Dec 13 02:28:44.119595 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2324701831" Dec 13 02:28:44.119792 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Dec 13 02:28:44.119792 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 02:28:44.119792 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 13 02:28:44.120681 systemd[1]: mnt-oem2324701831.mount: Deactivated successfully. Dec 13 02:28:44.618184 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Dec 13 02:28:44.834186 systemd-networkd[734]: ens192: Gained IPv6LL Dec 13 02:28:44.843472 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 02:28:44.844267 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Dec 13 02:28:44.844461 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Dec 13 02:28:44.844461 ignition[849]: INFO : files: op(10): [started] processing unit "vmtoolsd.service" Dec 13 02:28:44.844461 ignition[849]: INFO : files: op(10): [finished] processing unit "vmtoolsd.service" Dec 13 02:28:44.844461 ignition[849]: INFO : files: op(11): [started] processing unit "prepare-helm.service" Dec 13 02:28:44.844461 ignition[849]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:28:44.844461 ignition[849]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:28:44.844461 ignition[849]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" Dec 13 02:28:44.844461 ignition[849]: INFO : files: op(13): [started] processing unit "coreos-metadata.service" Dec 13 02:28:44.844461 ignition[849]: INFO : files: op(13): op(14): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 02:28:44.845766 ignition[849]: INFO : files: op(13): op(14): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 02:28:44.845766 ignition[849]: INFO : files: op(13): [finished] processing unit "coreos-metadata.service" Dec 13 02:28:44.845766 ignition[849]: INFO : files: op(15): [started] setting preset to enabled for "vmtoolsd.service" Dec 13 02:28:44.845766 ignition[849]: INFO : files: op(15): [finished] setting preset to enabled for "vmtoolsd.service" Dec 13 02:28:44.845766 ignition[849]: INFO : files: op(16): [started] setting preset to enabled for "prepare-helm.service" Dec 13 02:28:44.845766 ignition[849]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 02:28:44.845766 ignition[849]: INFO : files: op(17): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 02:28:44.845766 ignition[849]: INFO : files: op(17): op(18): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 02:28:45.240574 ignition[849]: INFO : files: op(17): op(18): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 02:28:45.240882 ignition[849]: INFO : files: op(17): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 02:28:45.240882 ignition[849]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:28:45.240882 ignition[849]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:28:45.240882 ignition[849]: INFO : files: files passed Dec 13 02:28:45.241640 ignition[849]: INFO : Ignition finished successfully Dec 13 02:28:45.246054 kernel: kauditd_printk_skb: 24 callbacks suppressed Dec 13 02:28:45.246081 kernel: audit: type=1130 audit(1734056925.241:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.243330 systemd[1]: Finished ignition-files.service. Dec 13 02:28:45.244124 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 02:28:45.247204 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 02:28:45.248282 systemd[1]: Starting ignition-quench.service... Dec 13 02:28:45.250382 initrd-setup-root-after-ignition[874]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 02:28:45.250931 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 02:28:45.251085 systemd[1]: Reached target ignition-complete.target. Dec 13 02:28:45.251574 systemd[1]: Starting initrd-parse-etc.service... Dec 13 02:28:45.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.255452 kernel: audit: type=1130 audit(1734056925.249:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.255188 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 02:28:45.255278 systemd[1]: Finished ignition-quench.service. Dec 13 02:28:45.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.258864 kernel: audit: type=1130 audit(1734056925.253:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.261847 kernel: audit: type=1131 audit(1734056925.253:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.263899 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 02:28:45.264140 systemd[1]: Finished initrd-parse-etc.service. Dec 13 02:28:45.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.264489 systemd[1]: Reached target initrd-fs.target. Dec 13 02:28:45.269451 kernel: audit: type=1130 audit(1734056925.262:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.269476 kernel: audit: type=1131 audit(1734056925.262:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.269525 systemd[1]: Reached target initrd.target. Dec 13 02:28:45.269668 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 02:28:45.270203 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 02:28:45.277089 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 02:28:45.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.279988 kernel: audit: type=1130 audit(1734056925.275:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.277937 systemd[1]: Starting initrd-cleanup.service... Dec 13 02:28:45.283887 systemd[1]: Stopped target nss-lookup.target. Dec 13 02:28:45.284232 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 02:28:45.284526 systemd[1]: Stopped target timers.target. Dec 13 02:28:45.284785 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 02:28:45.285016 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 02:28:45.285346 systemd[1]: Stopped target initrd.target. Dec 13 02:28:45.285603 systemd[1]: Stopped target basic.target. Dec 13 02:28:45.285871 systemd[1]: Stopped target ignition-complete.target. Dec 13 02:28:45.286138 systemd[1]: Stopped target ignition-diskful.target. Dec 13 02:28:45.286398 systemd[1]: Stopped target initrd-root-device.target. Dec 13 02:28:45.286664 systemd[1]: Stopped target remote-fs.target. Dec 13 02:28:45.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.289369 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 02:28:45.289655 systemd[1]: Stopped target sysinit.target. Dec 13 02:28:45.289850 kernel: audit: type=1131 audit(1734056925.283:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.289950 systemd[1]: Stopped target local-fs.target. Dec 13 02:28:45.290207 systemd[1]: Stopped target local-fs-pre.target. Dec 13 02:28:45.290465 systemd[1]: Stopped target swap.target. Dec 13 02:28:45.290694 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 02:28:45.290932 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 02:28:45.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.291280 systemd[1]: Stopped target cryptsetup.target. Dec 13 02:28:45.293807 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 02:28:45.293944 kernel: audit: type=1131 audit(1734056925.289:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.294043 systemd[1]: Stopped dracut-initqueue.service. Dec 13 02:28:45.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.294384 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 02:28:45.294473 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 02:28:45.296933 kernel: audit: type=1131 audit(1734056925.292:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.297094 systemd[1]: Stopped target paths.target. Dec 13 02:28:45.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.297240 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 02:28:45.297473 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 02:28:45.297778 systemd[1]: Stopped target slices.target. Dec 13 02:28:45.297952 systemd[1]: Stopped target sockets.target. Dec 13 02:28:45.298107 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 02:28:45.298172 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 02:28:45.298422 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 02:28:45.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.298477 systemd[1]: Stopped ignition-files.service. Dec 13 02:28:45.299268 systemd[1]: Stopping ignition-mount.service... Dec 13 02:28:45.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.305024 iscsid[739]: iscsid shutting down. Dec 13 02:28:45.302223 systemd[1]: Stopping iscsid.service... Dec 13 02:28:45.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.306099 ignition[888]: INFO : Ignition 2.14.0 Dec 13 02:28:45.306099 ignition[888]: INFO : Stage: umount Dec 13 02:28:45.306099 ignition[888]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:28:45.306099 ignition[888]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:28:45.306099 ignition[888]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:28:45.302323 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 02:28:45.302455 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 02:28:45.303248 systemd[1]: Stopping sysroot-boot.service... Dec 13 02:28:45.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.303352 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 02:28:45.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.303469 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 02:28:45.303663 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 02:28:45.303737 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 02:28:45.305173 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 02:28:45.305239 systemd[1]: Stopped iscsid.service. Dec 13 02:28:45.306951 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 02:28:45.307017 systemd[1]: Finished initrd-cleanup.service. Dec 13 02:28:45.308001 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 02:28:45.308026 systemd[1]: Closed iscsid.socket. Dec 13 02:28:45.310973 ignition[888]: INFO : umount: umount passed Dec 13 02:28:45.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.312345 systemd[1]: Stopping iscsiuio.service... Dec 13 02:28:45.314177 ignition[888]: INFO : Ignition finished successfully Dec 13 02:28:45.312640 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 02:28:45.312710 systemd[1]: Stopped ignition-mount.service. Dec 13 02:28:45.312868 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 02:28:45.312892 systemd[1]: Stopped ignition-disks.service. Dec 13 02:28:45.312999 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 02:28:45.313019 systemd[1]: Stopped ignition-kargs.service. Dec 13 02:28:45.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.313115 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 02:28:45.313135 systemd[1]: Stopped ignition-setup.service. Dec 13 02:28:45.314975 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 02:28:45.315025 systemd[1]: Stopped iscsiuio.service. Dec 13 02:28:45.315221 systemd[1]: Stopped target network.target. Dec 13 02:28:45.315350 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 02:28:45.315367 systemd[1]: Closed iscsiuio.socket. Dec 13 02:28:45.315621 systemd[1]: Stopping systemd-networkd.service... Dec 13 02:28:45.316024 systemd[1]: Stopping systemd-resolved.service... Dec 13 02:28:45.318551 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 02:28:45.318604 systemd[1]: Stopped systemd-networkd.service. Dec 13 02:28:45.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.319620 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 02:28:45.319642 systemd[1]: Closed systemd-networkd.socket. Dec 13 02:28:45.320246 systemd[1]: Stopping network-cleanup.service... Dec 13 02:28:45.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.320375 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 02:28:45.320401 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 02:28:45.320536 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Dec 13 02:28:45.320556 systemd[1]: Stopped afterburn-network-kargs.service. Dec 13 02:28:45.321721 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 02:28:45.321746 systemd[1]: Stopped systemd-sysctl.service. Dec 13 02:28:45.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.322747 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 02:28:45.322780 systemd[1]: Stopped systemd-modules-load.service. Dec 13 02:28:45.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.322000 audit: BPF prog-id=9 op=UNLOAD Dec 13 02:28:45.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.325460 systemd[1]: Stopping systemd-udevd.service... Dec 13 02:28:45.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.326282 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 02:28:45.326333 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 02:28:45.326708 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 02:28:45.326762 systemd[1]: Stopped systemd-resolved.service. Dec 13 02:28:45.327000 audit: BPF prog-id=6 op=UNLOAD Dec 13 02:28:45.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.327970 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 02:28:45.328041 systemd[1]: Stopped systemd-udevd.service. Dec 13 02:28:45.328326 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 02:28:45.328361 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 02:28:45.328466 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 02:28:45.328479 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 02:28:45.328573 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 02:28:45.328593 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 02:28:45.328704 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 02:28:45.328723 systemd[1]: Stopped dracut-cmdline.service. Dec 13 02:28:45.328822 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 02:28:45.328946 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 02:28:45.329410 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 02:28:45.329664 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 02:28:45.329688 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 02:28:45.333342 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 02:28:45.333405 systemd[1]: Stopped network-cleanup.service. Dec 13 02:28:45.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.333672 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 02:28:45.333716 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 02:28:45.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.429504 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 02:28:45.429560 systemd[1]: Stopped sysroot-boot.service. Dec 13 02:28:45.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.429809 systemd[1]: Reached target initrd-switch-root.target. Dec 13 02:28:45.429918 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 02:28:45.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:45.429943 systemd[1]: Stopped initrd-setup-root.service. Dec 13 02:28:45.430636 systemd[1]: Starting initrd-switch-root.service... Dec 13 02:28:45.437632 systemd[1]: Switching root. Dec 13 02:28:45.453895 systemd-journald[216]: Journal stopped Dec 13 02:28:48.780776 systemd-journald[216]: Received SIGTERM from PID 1 (systemd). Dec 13 02:28:48.780798 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 02:28:48.780808 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 02:28:48.780815 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 02:28:48.780820 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 02:28:48.780827 kernel: SELinux: policy capability open_perms=1 Dec 13 02:28:48.780847 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 02:28:48.780855 kernel: SELinux: policy capability always_check_network=0 Dec 13 02:28:48.780860 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 02:28:48.780872 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 02:28:48.780878 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 02:28:48.780884 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 02:28:48.780893 systemd[1]: Successfully loaded SELinux policy in 41.452ms. Dec 13 02:28:48.780902 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.771ms. Dec 13 02:28:48.780910 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:28:48.780917 systemd[1]: Detected virtualization vmware. Dec 13 02:28:48.780925 systemd[1]: Detected architecture x86-64. Dec 13 02:28:48.780932 systemd[1]: Detected first boot. Dec 13 02:28:48.780939 systemd[1]: Initializing machine ID from random generator. Dec 13 02:28:48.780946 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 02:28:48.780952 systemd[1]: Populated /etc with preset unit settings. Dec 13 02:28:48.780959 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:28:48.780967 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:28:48.780976 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:28:48.780984 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 02:28:48.780991 systemd[1]: Stopped initrd-switch-root.service. Dec 13 02:28:48.780997 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 02:28:48.781005 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 02:28:48.781011 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 02:28:48.781018 systemd[1]: Created slice system-getty.slice. Dec 13 02:28:48.781025 systemd[1]: Created slice system-modprobe.slice. Dec 13 02:28:48.781033 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 02:28:48.781040 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 02:28:48.781047 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 02:28:48.781053 systemd[1]: Created slice user.slice. Dec 13 02:28:48.781060 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:28:48.781067 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 02:28:48.781074 systemd[1]: Set up automount boot.automount. Dec 13 02:28:48.781080 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 02:28:48.781088 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 02:28:48.781096 systemd[1]: Stopped target initrd-fs.target. Dec 13 02:28:48.781105 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 02:28:48.781111 systemd[1]: Reached target integritysetup.target. Dec 13 02:28:48.781119 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:28:48.781127 systemd[1]: Reached target remote-fs.target. Dec 13 02:28:48.781134 systemd[1]: Reached target slices.target. Dec 13 02:28:48.781141 systemd[1]: Reached target swap.target. Dec 13 02:28:48.781148 systemd[1]: Reached target torcx.target. Dec 13 02:28:48.781156 systemd[1]: Reached target veritysetup.target. Dec 13 02:28:48.781163 systemd[1]: Listening on systemd-coredump.socket. Dec 13 02:28:48.781170 systemd[1]: Listening on systemd-initctl.socket. Dec 13 02:28:48.781177 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:28:48.781184 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:28:48.781192 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:28:48.781200 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 02:28:48.781207 systemd[1]: Mounting dev-hugepages.mount... Dec 13 02:28:48.781215 systemd[1]: Mounting dev-mqueue.mount... Dec 13 02:28:48.781222 systemd[1]: Mounting media.mount... Dec 13 02:28:48.781229 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:28:48.781237 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 02:28:48.781244 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 02:28:48.781252 systemd[1]: Mounting tmp.mount... Dec 13 02:28:48.781259 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 02:28:48.781266 systemd[1]: Starting ignition-delete-config.service... Dec 13 02:28:48.781273 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:28:48.781281 systemd[1]: Starting modprobe@configfs.service... Dec 13 02:28:48.781288 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:28:48.781295 systemd[1]: Starting modprobe@drm.service... Dec 13 02:28:48.781302 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:28:48.781310 systemd[1]: Starting modprobe@fuse.service... Dec 13 02:28:48.781318 systemd[1]: Starting modprobe@loop.service... Dec 13 02:28:48.781327 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 02:28:48.781334 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 02:28:48.781341 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 02:28:48.781349 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 02:28:48.781356 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 02:28:48.781363 systemd[1]: Stopped systemd-journald.service. Dec 13 02:28:48.781370 systemd[1]: Starting systemd-journald.service... Dec 13 02:28:48.781377 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:28:48.781385 systemd[1]: Starting systemd-network-generator.service... Dec 13 02:28:48.781393 systemd[1]: Starting systemd-remount-fs.service... Dec 13 02:28:48.781400 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:28:48.781407 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 02:28:48.781414 systemd[1]: Stopped verity-setup.service. Dec 13 02:28:48.781421 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:28:48.781429 systemd[1]: Mounted dev-hugepages.mount. Dec 13 02:28:48.781437 systemd[1]: Mounted dev-mqueue.mount. Dec 13 02:28:48.781444 systemd[1]: Mounted media.mount. Dec 13 02:28:48.781453 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 02:28:48.781460 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 02:28:48.781467 systemd[1]: Mounted tmp.mount. Dec 13 02:28:48.781475 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:28:48.781482 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:28:48.781489 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:28:48.781496 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:28:48.781503 systemd[1]: Finished modprobe@drm.service. Dec 13 02:28:48.781511 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:28:48.781519 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:28:48.781526 systemd[1]: Finished systemd-remount-fs.service. Dec 13 02:28:48.781534 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 02:28:48.781541 kernel: loop: module loaded Dec 13 02:28:48.781547 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 02:28:48.781554 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:28:48.781561 systemd[1]: Starting systemd-random-seed.service... Dec 13 02:28:48.781569 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 02:28:48.781575 systemd[1]: Finished systemd-network-generator.service. Dec 13 02:28:48.781584 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 02:28:48.781592 systemd[1]: Finished modprobe@configfs.service. Dec 13 02:28:48.781599 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:28:48.781606 kernel: fuse: init (API version 7.34) Dec 13 02:28:48.781613 systemd[1]: Finished modprobe@loop.service. Dec 13 02:28:48.781620 systemd[1]: Reached target network-pre.target. Dec 13 02:28:48.781627 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 02:28:48.781637 systemd-journald[1001]: Journal started Dec 13 02:28:48.781670 systemd-journald[1001]: Runtime Journal (/run/log/journal/f33a1088a1334f3e9b0a58500ce233dc) is 4.8M, max 38.8M, 34.0M free. Dec 13 02:28:45.816000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 02:28:45.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:28:45.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:28:45.923000 audit: BPF prog-id=10 op=LOAD Dec 13 02:28:45.923000 audit: BPF prog-id=10 op=UNLOAD Dec 13 02:28:45.923000 audit: BPF prog-id=11 op=LOAD Dec 13 02:28:45.923000 audit: BPF prog-id=11 op=UNLOAD Dec 13 02:28:46.092000 audit[922]: AVC avc: denied { associate } for pid=922 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 02:28:46.092000 audit[922]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=905 pid=922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:28:46.092000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:28:46.093000 audit[922]: AVC avc: denied { associate } for pid=922 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 02:28:46.093000 audit[922]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=905 pid=922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:28:46.093000 audit: CWD cwd="/" Dec 13 02:28:46.093000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:46.093000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:46.093000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:28:48.611000 audit: BPF prog-id=12 op=LOAD Dec 13 02:28:48.611000 audit: BPF prog-id=3 op=UNLOAD Dec 13 02:28:48.611000 audit: BPF prog-id=13 op=LOAD Dec 13 02:28:48.611000 audit: BPF prog-id=14 op=LOAD Dec 13 02:28:48.611000 audit: BPF prog-id=4 op=UNLOAD Dec 13 02:28:48.611000 audit: BPF prog-id=5 op=UNLOAD Dec 13 02:28:48.613000 audit: BPF prog-id=15 op=LOAD Dec 13 02:28:48.613000 audit: BPF prog-id=12 op=UNLOAD Dec 13 02:28:48.613000 audit: BPF prog-id=16 op=LOAD Dec 13 02:28:48.613000 audit: BPF prog-id=17 op=LOAD Dec 13 02:28:48.613000 audit: BPF prog-id=13 op=UNLOAD Dec 13 02:28:48.613000 audit: BPF prog-id=14 op=UNLOAD Dec 13 02:28:48.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.617000 audit: BPF prog-id=15 op=UNLOAD Dec 13 02:28:48.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.694000 audit: BPF prog-id=18 op=LOAD Dec 13 02:28:48.694000 audit: BPF prog-id=19 op=LOAD Dec 13 02:28:48.694000 audit: BPF prog-id=20 op=LOAD Dec 13 02:28:48.694000 audit: BPF prog-id=16 op=UNLOAD Dec 13 02:28:48.694000 audit: BPF prog-id=17 op=UNLOAD Dec 13 02:28:48.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.777000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 02:28:48.777000 audit[1001]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffe59ee00d0 a2=4000 a3=7ffe59ee016c items=0 ppid=1 pid=1001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:28:48.777000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 02:28:48.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.611161 systemd[1]: Queued start job for default target multi-user.target. Dec 13 02:28:46.087487 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:28:48.615818 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 02:28:46.089547 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:28:46.089560 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:28:46.089583 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:46Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 02:28:46.089590 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:46Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 02:28:46.089611 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:46Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 02:28:46.089619 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:46Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 02:28:46.089751 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:46Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 02:28:46.089775 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:28:46.089783 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:28:46.091739 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 02:28:46.091761 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 02:28:46.091773 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 02:28:46.091781 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 02:28:46.091791 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 02:28:46.091799 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 02:28:48.086444 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:48Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:28:48.086637 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:48Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:28:48.086710 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:48Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:28:48.086825 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:48Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:28:48.086887 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:48Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 02:28:48.086938 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T02:28:48Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 02:28:48.789616 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:28:48.789655 systemd[1]: Starting systemd-sysusers.service... Dec 13 02:28:48.789670 systemd[1]: Started systemd-journald.service. Dec 13 02:28:48.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.790642 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 02:28:48.790751 systemd[1]: Finished modprobe@fuse.service. Dec 13 02:28:48.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.790959 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 02:28:48.792313 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 02:28:48.793452 systemd[1]: Starting systemd-journal-flush.service... Dec 13 02:28:48.796054 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 02:28:48.801295 jq[988]: true Dec 13 02:28:48.814747 jq[1041]: true Dec 13 02:28:48.829784 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:28:48.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.830983 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:28:48.833727 systemd-journald[1001]: Time spent on flushing to /var/log/journal/f33a1088a1334f3e9b0a58500ce233dc is 30.866ms for 2015 entries. Dec 13 02:28:48.833727 systemd-journald[1001]: System Journal (/var/log/journal/f33a1088a1334f3e9b0a58500ce233dc) is 8.0M, max 584.8M, 576.8M free. Dec 13 02:28:48.950378 systemd-journald[1001]: Received client request to flush runtime journal. Dec 13 02:28:48.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.894353 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:28:48.951016 udevadm[1045]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 02:28:48.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:48.895419 systemd[1]: Starting systemd-udev-settle.service... Dec 13 02:28:48.921681 systemd[1]: Finished systemd-random-seed.service. Dec 13 02:28:48.921878 systemd[1]: Reached target first-boot-complete.target. Dec 13 02:28:48.931626 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:28:48.950976 systemd[1]: Finished systemd-journal-flush.service. Dec 13 02:28:49.101675 systemd[1]: Finished systemd-sysusers.service. Dec 13 02:28:49.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:49.510671 ignition[1042]: Ignition 2.14.0 Dec 13 02:28:49.510875 ignition[1042]: deleting config from guestinfo properties Dec 13 02:28:49.562940 ignition[1042]: Successfully deleted config Dec 13 02:28:49.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:49.563646 systemd[1]: Finished ignition-delete-config.service. Dec 13 02:28:49.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:49.976000 audit: BPF prog-id=21 op=LOAD Dec 13 02:28:49.976000 audit: BPF prog-id=22 op=LOAD Dec 13 02:28:49.976000 audit: BPF prog-id=7 op=UNLOAD Dec 13 02:28:49.976000 audit: BPF prog-id=8 op=UNLOAD Dec 13 02:28:49.977710 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 02:28:49.978893 systemd[1]: Starting systemd-udevd.service... Dec 13 02:28:49.991044 systemd-udevd[1053]: Using default interface naming scheme 'v252'. Dec 13 02:28:50.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:50.063000 audit: BPF prog-id=23 op=LOAD Dec 13 02:28:50.064514 systemd[1]: Started systemd-udevd.service. Dec 13 02:28:50.066060 systemd[1]: Starting systemd-networkd.service... Dec 13 02:28:50.077000 audit: BPF prog-id=24 op=LOAD Dec 13 02:28:50.077000 audit: BPF prog-id=25 op=LOAD Dec 13 02:28:50.077000 audit: BPF prog-id=26 op=LOAD Dec 13 02:28:50.080048 systemd[1]: Starting systemd-userdbd.service... Dec 13 02:28:50.096331 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 02:28:50.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:50.105539 systemd[1]: Started systemd-userdbd.service. Dec 13 02:28:50.132854 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 02:28:50.141956 kernel: ACPI: button: Power Button [PWRF] Dec 13 02:28:50.211121 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Dec 13 02:28:50.223516 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1068) Dec 13 02:28:50.223538 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Dec 13 02:28:50.223653 kernel: Guest personality initialized and is active Dec 13 02:28:50.211000 audit[1061]: AVC avc: denied { confidentiality } for pid=1061 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 02:28:50.211000 audit[1061]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55ae01da7ae0 a1=337fc a2=7fa410940bc5 a3=5 items=110 ppid=1053 pid=1061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:28:50.211000 audit: CWD cwd="/" Dec 13 02:28:50.211000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=1 name=(null) inode=24779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=2 name=(null) inode=24779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=3 name=(null) inode=24780 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=4 name=(null) inode=24779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=5 name=(null) inode=24781 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=6 name=(null) inode=24779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=7 name=(null) inode=24782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=8 name=(null) inode=24782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=9 name=(null) inode=24783 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=10 name=(null) inode=24782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=11 name=(null) inode=24784 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=12 name=(null) inode=24782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=13 name=(null) inode=24785 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=14 name=(null) inode=24782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=15 name=(null) inode=24786 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=16 name=(null) inode=24782 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=17 name=(null) inode=24787 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=18 name=(null) inode=24779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=19 name=(null) inode=24788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=20 name=(null) inode=24788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=21 name=(null) inode=24789 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=22 name=(null) inode=24788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=23 name=(null) inode=24790 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=24 name=(null) inode=24788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=25 name=(null) inode=24791 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=26 name=(null) inode=24788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=27 name=(null) inode=24792 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=28 name=(null) inode=24788 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=29 name=(null) inode=24793 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=30 name=(null) inode=24779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=31 name=(null) inode=24794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=32 name=(null) inode=24794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=33 name=(null) inode=24795 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=34 name=(null) inode=24794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=35 name=(null) inode=24796 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=36 name=(null) inode=24794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=37 name=(null) inode=24797 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=38 name=(null) inode=24794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=39 name=(null) inode=24798 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=40 name=(null) inode=24794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=41 name=(null) inode=24799 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=42 name=(null) inode=24779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=43 name=(null) inode=24800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=44 name=(null) inode=24800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=45 name=(null) inode=24801 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=46 name=(null) inode=24800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=47 name=(null) inode=24802 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=48 name=(null) inode=24800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=49 name=(null) inode=24803 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=50 name=(null) inode=24800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=51 name=(null) inode=24804 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=52 name=(null) inode=24800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=53 name=(null) inode=24805 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=55 name=(null) inode=24806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=56 name=(null) inode=24806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=57 name=(null) inode=24807 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=58 name=(null) inode=24806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=59 name=(null) inode=24808 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=60 name=(null) inode=24806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=61 name=(null) inode=24809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=62 name=(null) inode=24809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=63 name=(null) inode=24810 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=64 name=(null) inode=24809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=65 name=(null) inode=24811 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=66 name=(null) inode=24809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=67 name=(null) inode=24812 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=68 name=(null) inode=24809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=69 name=(null) inode=24813 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=70 name=(null) inode=24809 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=71 name=(null) inode=24814 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=72 name=(null) inode=24806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=73 name=(null) inode=24815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=74 name=(null) inode=24815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=75 name=(null) inode=24816 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=76 name=(null) inode=24815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=77 name=(null) inode=24817 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=78 name=(null) inode=24815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=79 name=(null) inode=24818 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=80 name=(null) inode=24815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=81 name=(null) inode=24819 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=82 name=(null) inode=24815 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=83 name=(null) inode=24820 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=84 name=(null) inode=24806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=85 name=(null) inode=24821 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=86 name=(null) inode=24821 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=87 name=(null) inode=24822 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=88 name=(null) inode=24821 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=89 name=(null) inode=24823 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=90 name=(null) inode=24821 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=91 name=(null) inode=24824 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=92 name=(null) inode=24821 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=93 name=(null) inode=24825 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=94 name=(null) inode=24821 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=95 name=(null) inode=24826 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=96 name=(null) inode=24806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=97 name=(null) inode=24827 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=98 name=(null) inode=24827 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=99 name=(null) inode=24828 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=100 name=(null) inode=24827 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=101 name=(null) inode=24829 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=102 name=(null) inode=24827 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=103 name=(null) inode=24830 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=104 name=(null) inode=24827 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=105 name=(null) inode=24831 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=106 name=(null) inode=24827 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=107 name=(null) inode=24832 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PATH item=109 name=(null) inode=24833 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:28:50.211000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 02:28:50.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:50.233187 systemd-networkd[1062]: lo: Link UP Dec 13 02:28:50.233193 systemd-networkd[1062]: lo: Gained carrier Dec 13 02:28:50.233643 systemd-networkd[1062]: Enumeration completed Dec 13 02:28:50.233729 systemd[1]: Started systemd-networkd.service. Dec 13 02:28:50.235068 systemd-networkd[1062]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Dec 13 02:28:50.239358 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Dec 13 02:28:50.239543 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Dec 13 02:28:50.240856 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Dec 13 02:28:50.241112 systemd-networkd[1062]: ens192: Link UP Dec 13 02:28:50.241297 systemd-networkd[1062]: ens192: Gained carrier Dec 13 02:28:50.244868 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Dec 13 02:28:50.244927 kernel: Initialized host personality Dec 13 02:28:50.248301 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Dec 13 02:28:50.247887 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:28:50.256862 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 02:28:50.279326 (udev-worker)[1068]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Dec 13 02:28:50.284855 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 02:28:50.300165 systemd[1]: Finished systemd-udev-settle.service. Dec 13 02:28:50.303891 kernel: kauditd_printk_skb: 227 callbacks suppressed Dec 13 02:28:50.303935 kernel: audit: type=1130 audit(1734056930.298:150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:50.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:50.303730 systemd[1]: Starting lvm2-activation-early.service... Dec 13 02:28:50.379916 lvm[1086]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:28:50.407434 systemd[1]: Finished lvm2-activation-early.service. Dec 13 02:28:50.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:50.407626 systemd[1]: Reached target cryptsetup.target. Dec 13 02:28:50.410855 kernel: audit: type=1130 audit(1734056930.405:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:50.411432 systemd[1]: Starting lvm2-activation.service... Dec 13 02:28:50.414249 lvm[1087]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:28:50.432451 systemd[1]: Finished lvm2-activation.service. Dec 13 02:28:50.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:50.432635 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:28:50.435850 kernel: audit: type=1130 audit(1734056930.430:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:50.435277 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 02:28:50.435293 systemd[1]: Reached target local-fs.target. Dec 13 02:28:50.435385 systemd[1]: Reached target machines.target. Dec 13 02:28:50.436441 systemd[1]: Starting ldconfig.service... Dec 13 02:28:50.459970 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:28:50.460014 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:28:50.460925 systemd[1]: Starting systemd-boot-update.service... Dec 13 02:28:50.461623 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 02:28:50.462439 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 02:28:50.463266 systemd[1]: Starting systemd-sysext.service... Dec 13 02:28:50.492523 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1089 (bootctl) Dec 13 02:28:50.493275 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 02:28:50.517169 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 02:28:50.522320 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 02:28:50.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:50.525860 kernel: audit: type=1130 audit(1734056930.520:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:50.533672 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 02:28:50.533787 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 02:28:50.553978 kernel: loop0: detected capacity change from 0 to 205544 Dec 13 02:28:51.036688 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 02:28:51.037059 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 02:28:51.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.040857 kernel: audit: type=1130 audit(1734056931.035:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.243857 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 02:28:51.312027 kernel: loop1: detected capacity change from 0 to 205544 Dec 13 02:28:51.335152 systemd-fsck[1098]: fsck.fat 4.2 (2021-01-31) Dec 13 02:28:51.335152 systemd-fsck[1098]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 02:28:51.336766 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 02:28:51.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.337881 systemd[1]: Mounting boot.mount... Dec 13 02:28:51.341908 kernel: audit: type=1130 audit(1734056931.335:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.391049 (sd-sysext)[1101]: Using extensions 'kubernetes'. Dec 13 02:28:51.391746 (sd-sysext)[1101]: Merged extensions into '/usr'. Dec 13 02:28:51.414891 systemd[1]: Mounted boot.mount. Dec 13 02:28:51.415176 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:28:51.416580 systemd[1]: Mounting usr-share-oem.mount... Dec 13 02:28:51.417359 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:28:51.419072 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:28:51.420099 systemd[1]: Starting modprobe@loop.service... Dec 13 02:28:51.420384 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:28:51.420474 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:28:51.420563 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:28:51.422351 systemd[1]: Mounted usr-share-oem.mount. Dec 13 02:28:51.422598 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:28:51.422667 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:28:51.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.425873 kernel: audit: type=1130 audit(1734056931.420:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.428790 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:28:51.428860 kernel: audit: type=1131 audit(1734056931.424:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.428949 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:28:51.429251 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:28:51.429327 systemd[1]: Finished modprobe@loop.service. Dec 13 02:28:51.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.431159 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:28:51.431230 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:28:51.435338 kernel: audit: type=1130 audit(1734056931.427:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.435391 kernel: audit: type=1131 audit(1734056931.427:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.432388 systemd[1]: Finished systemd-sysext.service. Dec 13 02:28:51.433363 systemd[1]: Starting ensure-sysext.service... Dec 13 02:28:51.436490 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 02:28:51.439240 systemd[1]: Reloading. Dec 13 02:28:51.463746 systemd-tmpfiles[1109]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 02:28:51.474004 systemd-tmpfiles[1109]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 02:28:51.486913 systemd-tmpfiles[1109]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 02:28:51.497036 /usr/lib/systemd/system-generators/torcx-generator[1128]: time="2024-12-13T02:28:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:28:51.497056 /usr/lib/systemd/system-generators/torcx-generator[1128]: time="2024-12-13T02:28:51Z" level=info msg="torcx already run" Dec 13 02:28:51.557795 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:28:51.557815 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:28:51.585144 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:28:51.648000 audit: BPF prog-id=27 op=LOAD Dec 13 02:28:51.648000 audit: BPF prog-id=18 op=UNLOAD Dec 13 02:28:51.648000 audit: BPF prog-id=28 op=LOAD Dec 13 02:28:51.648000 audit: BPF prog-id=29 op=LOAD Dec 13 02:28:51.648000 audit: BPF prog-id=19 op=UNLOAD Dec 13 02:28:51.648000 audit: BPF prog-id=20 op=UNLOAD Dec 13 02:28:51.648000 audit: BPF prog-id=30 op=LOAD Dec 13 02:28:51.649000 audit: BPF prog-id=31 op=LOAD Dec 13 02:28:51.649000 audit: BPF prog-id=21 op=UNLOAD Dec 13 02:28:51.649000 audit: BPF prog-id=22 op=UNLOAD Dec 13 02:28:51.649000 audit: BPF prog-id=32 op=LOAD Dec 13 02:28:51.649000 audit: BPF prog-id=23 op=UNLOAD Dec 13 02:28:51.651000 audit: BPF prog-id=33 op=LOAD Dec 13 02:28:51.651000 audit: BPF prog-id=24 op=UNLOAD Dec 13 02:28:51.651000 audit: BPF prog-id=34 op=LOAD Dec 13 02:28:51.651000 audit: BPF prog-id=35 op=LOAD Dec 13 02:28:51.651000 audit: BPF prog-id=25 op=UNLOAD Dec 13 02:28:51.651000 audit: BPF prog-id=26 op=UNLOAD Dec 13 02:28:51.657987 systemd[1]: Finished systemd-boot-update.service. Dec 13 02:28:51.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.665288 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:28:51.666737 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:28:51.667963 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:28:51.669713 systemd[1]: Starting modprobe@loop.service... Dec 13 02:28:51.669898 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:28:51.670028 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:28:51.670157 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:28:51.671100 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:28:51.671221 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:28:51.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.671702 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:28:51.671813 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:28:51.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.672285 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:28:51.672392 systemd[1]: Finished modprobe@loop.service. Dec 13 02:28:51.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.674076 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:28:51.675275 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:28:51.676377 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:28:51.678184 systemd[1]: Starting modprobe@loop.service... Dec 13 02:28:51.678362 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:28:51.678478 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:28:51.678610 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:28:51.679469 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:28:51.679590 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:28:51.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.680051 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:28:51.680167 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:28:51.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.680612 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:28:51.680717 systemd[1]: Finished modprobe@loop.service. Dec 13 02:28:51.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.681892 systemd-networkd[1062]: ens192: Gained IPv6LL Dec 13 02:28:51.683661 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:28:51.684702 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:28:51.686059 systemd[1]: Starting modprobe@drm.service... Dec 13 02:28:51.687280 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:28:51.688506 systemd[1]: Starting modprobe@loop.service... Dec 13 02:28:51.688734 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:28:51.689076 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:28:51.690242 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 02:28:51.690419 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:28:51.691187 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:28:51.691274 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:28:51.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.691626 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:28:51.691703 systemd[1]: Finished modprobe@drm.service. Dec 13 02:28:51.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.692033 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:28:51.692123 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:28:51.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.692438 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:28:51.692508 systemd[1]: Finished modprobe@loop.service. Dec 13 02:28:51.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.692919 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:28:51.692986 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:28:51.693678 systemd[1]: Finished ensure-sysext.service. Dec 13 02:28:51.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:51.733637 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 02:28:51.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:52.081246 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 02:28:52.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:52.082324 systemd[1]: Starting audit-rules.service... Dec 13 02:28:52.083238 systemd[1]: Starting clean-ca-certificates.service... Dec 13 02:28:52.084816 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 02:28:52.086000 audit: BPF prog-id=36 op=LOAD Dec 13 02:28:52.089095 systemd[1]: Starting systemd-resolved.service... Dec 13 02:28:52.088000 audit: BPF prog-id=37 op=LOAD Dec 13 02:28:52.091121 systemd[1]: Starting systemd-timesyncd.service... Dec 13 02:28:52.092696 systemd[1]: Starting systemd-update-utmp.service... Dec 13 02:28:52.093662 systemd[1]: Finished clean-ca-certificates.service. Dec 13 02:28:52.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:52.093864 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:28:52.100000 audit[1206]: SYSTEM_BOOT pid=1206 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 02:28:52.105369 systemd[1]: Finished systemd-update-utmp.service. Dec 13 02:28:52.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:52.129554 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 02:28:52.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:28:52.156000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 02:28:52.156000 audit[1220]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd2a947400 a2=420 a3=0 items=0 ppid=1200 pid=1220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:28:52.156000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 02:28:52.158512 augenrules[1220]: No rules Dec 13 02:28:52.158926 systemd[1]: Finished audit-rules.service. Dec 13 02:28:52.174650 systemd[1]: Started systemd-timesyncd.service. Dec 13 02:28:52.174826 systemd[1]: Reached target time-set.target. Dec 13 02:28:52.175065 systemd-resolved[1204]: Positive Trust Anchors: Dec 13 02:28:52.175231 systemd-resolved[1204]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:28:52.175298 systemd-resolved[1204]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:28:52.208921 systemd-resolved[1204]: Defaulting to hostname 'linux'. Dec 13 02:28:52.210220 systemd[1]: Started systemd-resolved.service. Dec 13 02:28:52.210384 systemd[1]: Reached target network.target. Dec 13 02:28:52.210477 systemd[1]: Reached target network-online.target. Dec 13 02:28:52.210571 systemd[1]: Reached target nss-lookup.target. Dec 13 02:28:52.247767 ldconfig[1088]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 02:28:52.262615 systemd[1]: Finished ldconfig.service. Dec 13 02:28:52.263702 systemd[1]: Starting systemd-update-done.service... Dec 13 02:28:52.271260 systemd[1]: Finished systemd-update-done.service. Dec 13 02:28:52.271432 systemd[1]: Reached target sysinit.target. Dec 13 02:28:52.271570 systemd[1]: Started motdgen.path. Dec 13 02:28:52.271673 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 02:28:52.271897 systemd[1]: Started logrotate.timer. Dec 13 02:28:52.272056 systemd[1]: Started mdadm.timer. Dec 13 02:28:52.272139 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 02:28:52.272232 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 02:28:52.272252 systemd[1]: Reached target paths.target. Dec 13 02:28:52.272333 systemd[1]: Reached target timers.target. Dec 13 02:28:52.272581 systemd[1]: Listening on dbus.socket. Dec 13 02:28:52.273409 systemd[1]: Starting docker.socket... Dec 13 02:28:52.282497 systemd[1]: Listening on sshd.socket. Dec 13 02:28:52.282683 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:28:52.282994 systemd[1]: Listening on docker.socket. Dec 13 02:28:52.283297 systemd[1]: Reached target sockets.target. Dec 13 02:28:52.283390 systemd[1]: Reached target basic.target. Dec 13 02:28:52.283503 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:28:52.283522 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:28:52.284528 systemd[1]: Starting containerd.service... Dec 13 02:28:52.285447 systemd[1]: Starting dbus.service... Dec 13 02:28:52.286722 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 02:28:52.287990 systemd[1]: Starting extend-filesystems.service... Dec 13 02:28:52.289647 jq[1231]: false Dec 13 02:28:52.288705 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 02:28:52.292076 systemd[1]: Starting kubelet.service... Dec 13 02:28:52.293001 systemd[1]: Starting motdgen.service... Dec 13 02:28:52.294437 systemd[1]: Starting prepare-helm.service... Dec 13 02:28:52.295604 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 02:28:52.297157 systemd[1]: Starting sshd-keygen.service... Dec 13 02:28:52.299348 systemd[1]: Starting systemd-logind.service... Dec 13 02:28:52.302182 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:28:52.302223 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 02:28:52.302716 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 02:28:52.303194 systemd[1]: Starting update-engine.service... Dec 13 02:28:52.304103 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 02:28:52.305143 systemd[1]: Starting vmtoolsd.service... Dec 13 02:28:52.306330 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 02:28:52.306455 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 02:28:52.320251 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 02:28:52.321946 jq[1247]: true Dec 13 02:28:52.320386 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 02:28:52.323918 systemd[1]: Started vmtoolsd.service. Dec 13 02:28:52.327627 jq[1259]: true Dec 13 02:28:52.331332 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 02:28:52.331442 systemd[1]: Finished motdgen.service. Dec 13 02:28:52.351150 extend-filesystems[1232]: Found loop1 Dec 13 02:28:52.351150 extend-filesystems[1232]: Found sda Dec 13 02:28:52.351150 extend-filesystems[1232]: Found sda1 Dec 13 02:28:52.351150 extend-filesystems[1232]: Found sda2 Dec 13 02:28:52.351150 extend-filesystems[1232]: Found sda3 Dec 13 02:28:52.351150 extend-filesystems[1232]: Found usr Dec 13 02:28:52.351150 extend-filesystems[1232]: Found sda4 Dec 13 02:28:52.351150 extend-filesystems[1232]: Found sda6 Dec 13 02:28:52.351150 extend-filesystems[1232]: Found sda7 Dec 13 02:28:52.351150 extend-filesystems[1232]: Found sda9 Dec 13 02:28:52.351150 extend-filesystems[1232]: Checking size of /dev/sda9 Dec 13 02:28:52.366613 env[1256]: time="2024-12-13T02:28:52.366581592Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 02:30:01.852661 systemd-resolved[1204]: Clock change detected. Flushing caches. Dec 13 02:30:01.852745 systemd-timesyncd[1205]: Contacted time server 72.46.53.234:123 (0.flatcar.pool.ntp.org). Dec 13 02:30:01.852823 systemd-timesyncd[1205]: Initial clock synchronization to Fri 2024-12-13 02:30:01.852520 UTC. Dec 13 02:30:01.860385 tar[1254]: linux-amd64/helm Dec 13 02:30:01.869966 env[1256]: time="2024-12-13T02:30:01.869930234Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 02:30:01.870044 env[1256]: time="2024-12-13T02:30:01.870020622Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:30:01.875851 env[1256]: time="2024-12-13T02:30:01.875813908Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:30:01.875851 env[1256]: time="2024-12-13T02:30:01.875846427Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:30:01.876030 env[1256]: time="2024-12-13T02:30:01.876012229Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:30:01.876030 env[1256]: time="2024-12-13T02:30:01.876027988Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 02:30:01.876077 env[1256]: time="2024-12-13T02:30:01.876039396Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 02:30:01.876077 env[1256]: time="2024-12-13T02:30:01.876047830Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 02:30:01.876113 env[1256]: time="2024-12-13T02:30:01.876092932Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:30:01.876311 env[1256]: time="2024-12-13T02:30:01.876293219Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:30:01.876447 env[1256]: time="2024-12-13T02:30:01.876425051Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:30:01.876473 env[1256]: time="2024-12-13T02:30:01.876446704Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 02:30:01.876509 env[1256]: time="2024-12-13T02:30:01.876491080Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 02:30:01.876537 env[1256]: time="2024-12-13T02:30:01.876508616Z" level=info msg="metadata content store policy set" policy=shared Dec 13 02:30:01.884363 systemd-logind[1241]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 02:30:01.884383 systemd-logind[1241]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 02:30:01.884981 systemd-logind[1241]: New seat seat0. Dec 13 02:30:01.897328 env[1256]: time="2024-12-13T02:30:01.897223572Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 02:30:01.897328 env[1256]: time="2024-12-13T02:30:01.897277607Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 02:30:01.897328 env[1256]: time="2024-12-13T02:30:01.897292170Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 02:30:01.897675 env[1256]: time="2024-12-13T02:30:01.897351161Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 02:30:01.897675 env[1256]: time="2024-12-13T02:30:01.897365128Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 02:30:01.897675 env[1256]: time="2024-12-13T02:30:01.897376366Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 02:30:01.897675 env[1256]: time="2024-12-13T02:30:01.897394593Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 02:30:01.897675 env[1256]: time="2024-12-13T02:30:01.897410425Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 02:30:01.897675 env[1256]: time="2024-12-13T02:30:01.897422094Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 02:30:01.897675 env[1256]: time="2024-12-13T02:30:01.897434256Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 02:30:01.897675 env[1256]: time="2024-12-13T02:30:01.897447099Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 02:30:01.897675 env[1256]: time="2024-12-13T02:30:01.897459072Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 02:30:01.897675 env[1256]: time="2024-12-13T02:30:01.897668870Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 02:30:01.897858 env[1256]: time="2024-12-13T02:30:01.897729147Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 02:30:01.898002 env[1256]: time="2024-12-13T02:30:01.897900389Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 02:30:01.898002 env[1256]: time="2024-12-13T02:30:01.897928650Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 02:30:01.898002 env[1256]: time="2024-12-13T02:30:01.897942202Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 02:30:01.898147 env[1256]: time="2024-12-13T02:30:01.898069762Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 02:30:01.898147 env[1256]: time="2024-12-13T02:30:01.898085025Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 02:30:01.898478 env[1256]: time="2024-12-13T02:30:01.898414747Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 02:30:01.898478 env[1256]: time="2024-12-13T02:30:01.898430469Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 02:30:01.898478 env[1256]: time="2024-12-13T02:30:01.898438184Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 02:30:01.898478 env[1256]: time="2024-12-13T02:30:01.898446563Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 02:30:01.898478 env[1256]: time="2024-12-13T02:30:01.898453646Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 02:30:01.898633 env[1256]: time="2024-12-13T02:30:01.898460495Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 02:30:01.898672 env[1256]: time="2024-12-13T02:30:01.898636574Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 02:30:01.898733 env[1256]: time="2024-12-13T02:30:01.898721417Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 02:30:01.898778 env[1256]: time="2024-12-13T02:30:01.898734613Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 02:30:01.898778 env[1256]: time="2024-12-13T02:30:01.898745556Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 02:30:01.898778 env[1256]: time="2024-12-13T02:30:01.898773364Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 02:30:01.898828 env[1256]: time="2024-12-13T02:30:01.898784540Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 02:30:01.898828 env[1256]: time="2024-12-13T02:30:01.898792545Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 02:30:01.898828 env[1256]: time="2024-12-13T02:30:01.898806376Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 02:30:01.898879 env[1256]: time="2024-12-13T02:30:01.898831569Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 02:30:01.899023 env[1256]: time="2024-12-13T02:30:01.898987829Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 02:30:01.902508 env[1256]: time="2024-12-13T02:30:01.899027055Z" level=info msg="Connect containerd service" Dec 13 02:30:01.902508 env[1256]: time="2024-12-13T02:30:01.899049672Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 02:30:01.902591 bash[1280]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:30:01.900950 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 02:30:01.902690 extend-filesystems[1232]: Old size kept for /dev/sda9 Dec 13 02:30:01.902690 extend-filesystems[1232]: Found sr0 Dec 13 02:30:01.901063 systemd[1]: Finished extend-filesystems.service. Dec 13 02:30:01.902100 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 02:30:01.904188 env[1256]: time="2024-12-13T02:30:01.904117229Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:30:01.905388 env[1256]: time="2024-12-13T02:30:01.904345026Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 02:30:01.905388 env[1256]: time="2024-12-13T02:30:01.904406539Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 02:30:01.905388 env[1256]: time="2024-12-13T02:30:01.905022942Z" level=info msg="containerd successfully booted in 0.060566s" Dec 13 02:30:01.904486 systemd[1]: Started containerd.service. Dec 13 02:30:01.915313 env[1256]: time="2024-12-13T02:30:01.915263267Z" level=info msg="Start subscribing containerd event" Dec 13 02:30:01.915397 env[1256]: time="2024-12-13T02:30:01.915328984Z" level=info msg="Start recovering state" Dec 13 02:30:01.915397 env[1256]: time="2024-12-13T02:30:01.915389620Z" level=info msg="Start event monitor" Dec 13 02:30:01.915437 env[1256]: time="2024-12-13T02:30:01.915403821Z" level=info msg="Start snapshots syncer" Dec 13 02:30:01.915437 env[1256]: time="2024-12-13T02:30:01.915413415Z" level=info msg="Start cni network conf syncer for default" Dec 13 02:30:01.915437 env[1256]: time="2024-12-13T02:30:01.915422128Z" level=info msg="Start streaming server" Dec 13 02:30:01.916139 dbus-daemon[1230]: [system] SELinux support is enabled Dec 13 02:30:01.916270 systemd[1]: Started dbus.service. Dec 13 02:30:01.917912 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 02:30:01.917938 systemd[1]: Reached target system-config.target. Dec 13 02:30:01.918078 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 02:30:01.918091 systemd[1]: Reached target user-config.target. Dec 13 02:30:01.919178 systemd[1]: Started systemd-logind.service. Dec 13 02:30:01.929207 kernel: NET: Registered PF_VSOCK protocol family Dec 13 02:30:01.932991 update_engine[1245]: I1213 02:30:01.932189 1245 main.cc:92] Flatcar Update Engine starting Dec 13 02:30:01.936663 systemd[1]: Started update-engine.service. Dec 13 02:30:01.936829 update_engine[1245]: I1213 02:30:01.936692 1245 update_check_scheduler.cc:74] Next update check in 5m20s Dec 13 02:30:01.938427 systemd[1]: Started locksmithd.service. Dec 13 02:30:02.265097 tar[1254]: linux-amd64/LICENSE Dec 13 02:30:02.265097 tar[1254]: linux-amd64/README.md Dec 13 02:30:02.267967 systemd[1]: Finished prepare-helm.service. Dec 13 02:30:02.442211 locksmithd[1294]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 02:30:02.978070 systemd[1]: Started kubelet.service. Dec 13 02:30:03.032870 sshd_keygen[1255]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 02:30:03.046526 systemd[1]: Finished sshd-keygen.service. Dec 13 02:30:03.047710 systemd[1]: Starting issuegen.service... Dec 13 02:30:03.051493 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 02:30:03.051596 systemd[1]: Finished issuegen.service. Dec 13 02:30:03.052722 systemd[1]: Starting systemd-user-sessions.service... Dec 13 02:30:03.056642 systemd[1]: Finished systemd-user-sessions.service. Dec 13 02:30:03.057728 systemd[1]: Started getty@tty1.service. Dec 13 02:30:03.058592 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 02:30:03.058791 systemd[1]: Reached target getty.target. Dec 13 02:30:03.058928 systemd[1]: Reached target multi-user.target. Dec 13 02:30:03.059901 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 02:30:03.065369 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 02:30:03.065464 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 02:30:03.065643 systemd[1]: Startup finished in 899ms (kernel) + 5.208s (initrd) + 7.832s (userspace) = 13.939s. Dec 13 02:30:03.089816 login[1363]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 02:30:03.090080 login[1362]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 02:30:03.129297 systemd[1]: Created slice user-500.slice. Dec 13 02:30:03.130267 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 02:30:03.131781 systemd-logind[1241]: New session 1 of user core. Dec 13 02:30:03.134061 systemd-logind[1241]: New session 2 of user core. Dec 13 02:30:03.139098 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 02:30:03.140128 systemd[1]: Starting user@500.service... Dec 13 02:30:03.154665 (systemd)[1371]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:30:03.251220 systemd[1371]: Queued start job for default target default.target. Dec 13 02:30:03.252289 systemd[1371]: Reached target paths.target. Dec 13 02:30:03.252405 systemd[1371]: Reached target sockets.target. Dec 13 02:30:03.252482 systemd[1371]: Reached target timers.target. Dec 13 02:30:03.252557 systemd[1371]: Reached target basic.target. Dec 13 02:30:03.252666 systemd[1371]: Reached target default.target. Dec 13 02:30:03.252720 systemd[1]: Started user@500.service. Dec 13 02:30:03.253070 systemd[1371]: Startup finished in 94ms. Dec 13 02:30:03.253655 systemd[1]: Started session-1.scope. Dec 13 02:30:03.254301 systemd[1]: Started session-2.scope. Dec 13 02:30:03.703974 kubelet[1350]: E1213 02:30:03.703915 1350 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:30:03.705174 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:30:03.705248 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:30:13.955836 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 02:30:13.955998 systemd[1]: Stopped kubelet.service. Dec 13 02:30:13.957169 systemd[1]: Starting kubelet.service... Dec 13 02:30:14.285966 systemd[1]: Started kubelet.service. Dec 13 02:30:14.329786 kubelet[1398]: E1213 02:30:14.329749 1398 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:30:14.331806 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:30:14.331877 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:30:24.582448 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 02:30:24.582601 systemd[1]: Stopped kubelet.service. Dec 13 02:30:24.583781 systemd[1]: Starting kubelet.service... Dec 13 02:30:24.775180 systemd[1]: Started kubelet.service. Dec 13 02:30:24.834791 kubelet[1407]: E1213 02:30:24.834733 1407 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:30:24.835963 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:30:24.836033 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:30:35.086667 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 02:30:35.086822 systemd[1]: Stopped kubelet.service. Dec 13 02:30:35.088337 systemd[1]: Starting kubelet.service... Dec 13 02:30:35.426111 systemd[1]: Started kubelet.service. Dec 13 02:30:35.445618 kubelet[1417]: E1213 02:30:35.445596 1417 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:30:35.446617 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:30:35.446688 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:30:42.002124 systemd[1]: Created slice system-sshd.slice. Dec 13 02:30:42.003249 systemd[1]: Started sshd@0-139.178.70.105:22-147.75.109.163:43844.service. Dec 13 02:30:42.045065 sshd[1423]: Accepted publickey for core from 147.75.109.163 port 43844 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:30:42.045978 sshd[1423]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:30:42.049704 systemd[1]: Started session-3.scope. Dec 13 02:30:42.050205 systemd-logind[1241]: New session 3 of user core. Dec 13 02:30:42.097030 systemd[1]: Started sshd@1-139.178.70.105:22-147.75.109.163:43846.service. Dec 13 02:30:42.129150 sshd[1428]: Accepted publickey for core from 147.75.109.163 port 43846 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:30:42.130551 sshd[1428]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:30:42.135421 systemd[1]: Started session-4.scope. Dec 13 02:30:42.135804 systemd-logind[1241]: New session 4 of user core. Dec 13 02:30:42.187566 sshd[1428]: pam_unix(sshd:session): session closed for user core Dec 13 02:30:42.189351 systemd[1]: Started sshd@2-139.178.70.105:22-147.75.109.163:43860.service. Dec 13 02:30:42.190943 systemd-logind[1241]: Session 4 logged out. Waiting for processes to exit. Dec 13 02:30:42.191056 systemd[1]: sshd@1-139.178.70.105:22-147.75.109.163:43846.service: Deactivated successfully. Dec 13 02:30:42.191438 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 02:30:42.192436 systemd-logind[1241]: Removed session 4. Dec 13 02:30:42.219004 sshd[1433]: Accepted publickey for core from 147.75.109.163 port 43860 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:30:42.219820 sshd[1433]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:30:42.222862 systemd[1]: Started session-5.scope. Dec 13 02:30:42.223200 systemd-logind[1241]: New session 5 of user core. Dec 13 02:30:42.271759 sshd[1433]: pam_unix(sshd:session): session closed for user core Dec 13 02:30:42.274070 systemd[1]: sshd@2-139.178.70.105:22-147.75.109.163:43860.service: Deactivated successfully. Dec 13 02:30:42.274463 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 02:30:42.274830 systemd-logind[1241]: Session 5 logged out. Waiting for processes to exit. Dec 13 02:30:42.275497 systemd[1]: Started sshd@3-139.178.70.105:22-147.75.109.163:43872.service. Dec 13 02:30:42.276086 systemd-logind[1241]: Removed session 5. Dec 13 02:30:42.304588 sshd[1440]: Accepted publickey for core from 147.75.109.163 port 43872 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:30:42.305474 sshd[1440]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:30:42.308666 systemd-logind[1241]: New session 6 of user core. Dec 13 02:30:42.308926 systemd[1]: Started session-6.scope. Dec 13 02:30:42.358528 sshd[1440]: pam_unix(sshd:session): session closed for user core Dec 13 02:30:42.360622 systemd[1]: sshd@3-139.178.70.105:22-147.75.109.163:43872.service: Deactivated successfully. Dec 13 02:30:42.360988 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 02:30:42.361414 systemd-logind[1241]: Session 6 logged out. Waiting for processes to exit. Dec 13 02:30:42.362123 systemd[1]: Started sshd@4-139.178.70.105:22-147.75.109.163:43876.service. Dec 13 02:30:42.362839 systemd-logind[1241]: Removed session 6. Dec 13 02:30:42.391316 sshd[1446]: Accepted publickey for core from 147.75.109.163 port 43876 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:30:42.392075 sshd[1446]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:30:42.394720 systemd-logind[1241]: New session 7 of user core. Dec 13 02:30:42.395213 systemd[1]: Started session-7.scope. Dec 13 02:30:42.454081 sudo[1449]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 02:30:42.454236 sudo[1449]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:30:42.462416 dbus-daemon[1230]: ЍR$\xb1U: received setenforce notice (enforcing=1921078800) Dec 13 02:30:42.462525 sudo[1449]: pam_unix(sudo:session): session closed for user root Dec 13 02:30:42.464252 sshd[1446]: pam_unix(sshd:session): session closed for user core Dec 13 02:30:42.466545 systemd[1]: Started sshd@5-139.178.70.105:22-147.75.109.163:43878.service. Dec 13 02:30:42.468306 systemd[1]: sshd@4-139.178.70.105:22-147.75.109.163:43876.service: Deactivated successfully. Dec 13 02:30:42.468699 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 02:30:42.469111 systemd-logind[1241]: Session 7 logged out. Waiting for processes to exit. Dec 13 02:30:42.469754 systemd-logind[1241]: Removed session 7. Dec 13 02:30:42.497081 sshd[1452]: Accepted publickey for core from 147.75.109.163 port 43878 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:30:42.497868 sshd[1452]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:30:42.500191 systemd-logind[1241]: New session 8 of user core. Dec 13 02:30:42.500882 systemd[1]: Started session-8.scope. Dec 13 02:30:42.549700 sudo[1457]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 02:30:42.549833 sudo[1457]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:30:42.551706 sudo[1457]: pam_unix(sudo:session): session closed for user root Dec 13 02:30:42.554362 sudo[1456]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 02:30:42.554492 sudo[1456]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:30:42.559736 systemd[1]: Stopping audit-rules.service... Dec 13 02:30:42.563181 kernel: kauditd_printk_skb: 54 callbacks suppressed Dec 13 02:30:42.563238 kernel: audit: type=1305 audit(1734057042.559:212): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:30:42.563255 kernel: audit: type=1300 audit(1734057042.559:212): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffdc86eb60 a2=420 a3=0 items=0 ppid=1 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.559000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:30:42.559000 audit[1460]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffdc86eb60 a2=420 a3=0 items=0 ppid=1 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.559000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:30:42.567690 kernel: audit: type=1327 audit(1734057042.559:212): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:30:42.567713 auditctl[1460]: No rules Dec 13 02:30:42.567933 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 02:30:42.568047 systemd[1]: Stopped audit-rules.service. Dec 13 02:30:42.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:42.569247 systemd[1]: Starting audit-rules.service... Dec 13 02:30:42.572177 kernel: audit: type=1131 audit(1734057042.566:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:42.582908 augenrules[1477]: No rules Dec 13 02:30:42.583394 systemd[1]: Finished audit-rules.service. Dec 13 02:30:42.595736 kernel: audit: type=1130 audit(1734057042.582:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:42.595771 kernel: audit: type=1106 audit(1734057042.582:215): pid=1456 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:30:42.595786 kernel: audit: type=1104 audit(1734057042.582:216): pid=1456 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:30:42.595805 kernel: audit: type=1130 audit(1734057042.583:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.105:22-147.75.109.163:43888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:42.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:42.582000 audit[1456]: USER_END pid=1456 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:30:42.582000 audit[1456]: CRED_DISP pid=1456 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:30:42.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.105:22-147.75.109.163:43888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:42.583838 sudo[1456]: pam_unix(sudo:session): session closed for user root Dec 13 02:30:42.586547 systemd[1]: Started sshd@6-139.178.70.105:22-147.75.109.163:43888.service. Dec 13 02:30:42.589741 sshd[1452]: pam_unix(sshd:session): session closed for user core Dec 13 02:30:42.597831 systemd[1]: sshd@5-139.178.70.105:22-147.75.109.163:43878.service: Deactivated successfully. Dec 13 02:30:42.595000 audit[1452]: USER_END pid=1452 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:30:42.598295 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 02:30:42.601844 systemd-logind[1241]: Session 8 logged out. Waiting for processes to exit. Dec 13 02:30:42.596000 audit[1452]: CRED_DISP pid=1452 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:30:42.604973 kernel: audit: type=1106 audit(1734057042.595:218): pid=1452 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:30:42.605000 kernel: audit: type=1104 audit(1734057042.596:219): pid=1452 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:30:42.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.105:22-147.75.109.163:43878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:42.605228 systemd-logind[1241]: Removed session 8. Dec 13 02:30:42.617000 audit[1482]: USER_ACCT pid=1482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:30:42.619174 sshd[1482]: Accepted publickey for core from 147.75.109.163 port 43888 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:30:42.618000 audit[1482]: CRED_ACQ pid=1482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:30:42.618000 audit[1482]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf0de3be0 a2=3 a3=0 items=0 ppid=1 pid=1482 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.618000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:30:42.620339 sshd[1482]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:30:42.622834 systemd-logind[1241]: New session 9 of user core. Dec 13 02:30:42.623307 systemd[1]: Started session-9.scope. Dec 13 02:30:42.624000 audit[1482]: USER_START pid=1482 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:30:42.625000 audit[1485]: CRED_ACQ pid=1485 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:30:42.670000 audit[1486]: USER_ACCT pid=1486 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:30:42.670000 audit[1486]: CRED_REFR pid=1486 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:30:42.671433 sudo[1486]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 02:30:42.671572 sudo[1486]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:30:42.671000 audit[1486]: USER_START pid=1486 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:30:42.686830 systemd[1]: Starting docker.service... Dec 13 02:30:42.708782 env[1496]: time="2024-12-13T02:30:42.708750302Z" level=info msg="Starting up" Dec 13 02:30:42.709584 env[1496]: time="2024-12-13T02:30:42.709572717Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:30:42.709672 env[1496]: time="2024-12-13T02:30:42.709663429Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:30:42.709728 env[1496]: time="2024-12-13T02:30:42.709717699Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:30:42.709773 env[1496]: time="2024-12-13T02:30:42.709763890Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:30:42.710918 env[1496]: time="2024-12-13T02:30:42.710907684Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:30:42.710966 env[1496]: time="2024-12-13T02:30:42.710956447Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:30:42.711012 env[1496]: time="2024-12-13T02:30:42.711001370Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:30:42.711061 env[1496]: time="2024-12-13T02:30:42.711051899Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:30:42.714767 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport4001093619-merged.mount: Deactivated successfully. Dec 13 02:30:42.727201 env[1496]: time="2024-12-13T02:30:42.727183428Z" level=info msg="Loading containers: start." Dec 13 02:30:42.768000 audit[1526]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1526 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.768000 audit[1526]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffde93f95c0 a2=0 a3=7ffde93f95ac items=0 ppid=1496 pid=1526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.768000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 02:30:42.769000 audit[1528]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1528 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.769000 audit[1528]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe7cba5cc0 a2=0 a3=7ffe7cba5cac items=0 ppid=1496 pid=1528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.769000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 02:30:42.770000 audit[1530]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1530 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.770000 audit[1530]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff5cb7d450 a2=0 a3=7fff5cb7d43c items=0 ppid=1496 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.770000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:30:42.771000 audit[1532]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1532 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.771000 audit[1532]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff9f731520 a2=0 a3=7fff9f73150c items=0 ppid=1496 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.771000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:30:42.773000 audit[1534]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1534 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.773000 audit[1534]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe3bfcb770 a2=0 a3=7ffe3bfcb75c items=0 ppid=1496 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.773000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 02:30:42.787000 audit[1539]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1539 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.787000 audit[1539]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd7e3cee10 a2=0 a3=7ffd7e3cedfc items=0 ppid=1496 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.787000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 02:30:42.790000 audit[1541]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1541 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.790000 audit[1541]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffe2c5fac0 a2=0 a3=7fffe2c5faac items=0 ppid=1496 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.790000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 02:30:42.791000 audit[1543]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1543 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.791000 audit[1543]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdbe178a30 a2=0 a3=7ffdbe178a1c items=0 ppid=1496 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.791000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 02:30:42.792000 audit[1545]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1545 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.792000 audit[1545]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffce5be1d00 a2=0 a3=7ffce5be1cec items=0 ppid=1496 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.792000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:30:42.796000 audit[1549]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1549 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.796000 audit[1549]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd2b5dd9c0 a2=0 a3=7ffd2b5dd9ac items=0 ppid=1496 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.796000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:30:42.801000 audit[1550]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1550 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.801000 audit[1550]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe7cca3730 a2=0 a3=7ffe7cca371c items=0 ppid=1496 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.801000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:30:42.811180 kernel: Initializing XFRM netlink socket Dec 13 02:30:42.833972 env[1496]: time="2024-12-13T02:30:42.833954024Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 02:30:42.845000 audit[1558]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1558 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.845000 audit[1558]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffdc14b9bb0 a2=0 a3=7ffdc14b9b9c items=0 ppid=1496 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.845000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 02:30:42.853000 audit[1561]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1561 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.853000 audit[1561]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe3896a350 a2=0 a3=7ffe3896a33c items=0 ppid=1496 pid=1561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.853000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 02:30:42.855000 audit[1564]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1564 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.855000 audit[1564]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd682bf220 a2=0 a3=7ffd682bf20c items=0 ppid=1496 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.855000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 02:30:42.857000 audit[1566]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1566 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.857000 audit[1566]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd7ad1ca60 a2=0 a3=7ffd7ad1ca4c items=0 ppid=1496 pid=1566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.857000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 02:30:42.859000 audit[1568]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1568 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.859000 audit[1568]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff8cc9ec40 a2=0 a3=7fff8cc9ec2c items=0 ppid=1496 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.859000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 02:30:42.860000 audit[1570]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1570 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.860000 audit[1570]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff68e6fad0 a2=0 a3=7fff68e6fabc items=0 ppid=1496 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.860000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 02:30:42.862000 audit[1572]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1572 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.862000 audit[1572]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe4b32ce30 a2=0 a3=7ffe4b32ce1c items=0 ppid=1496 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.862000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 02:30:42.868000 audit[1575]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1575 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.868000 audit[1575]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe53c65580 a2=0 a3=7ffe53c6556c items=0 ppid=1496 pid=1575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.868000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 02:30:42.869000 audit[1577]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1577 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.869000 audit[1577]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffcaae56100 a2=0 a3=7ffcaae560ec items=0 ppid=1496 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.869000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:30:42.870000 audit[1579]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1579 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.870000 audit[1579]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd264fccf0 a2=0 a3=7ffd264fccdc items=0 ppid=1496 pid=1579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.870000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:30:42.871000 audit[1581]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1581 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.871000 audit[1581]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd45d93600 a2=0 a3=7ffd45d935ec items=0 ppid=1496 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.871000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 02:30:42.873498 systemd-networkd[1062]: docker0: Link UP Dec 13 02:30:42.876000 audit[1585]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1585 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.876000 audit[1585]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc93e26550 a2=0 a3=7ffc93e2653c items=0 ppid=1496 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.876000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:30:42.880000 audit[1586]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1586 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:30:42.880000 audit[1586]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff6c795eb0 a2=0 a3=7fff6c795e9c items=0 ppid=1496 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:30:42.880000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:30:42.882189 env[1496]: time="2024-12-13T02:30:42.882168771Z" level=info msg="Loading containers: done." Dec 13 02:30:42.888131 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1256229916-merged.mount: Deactivated successfully. Dec 13 02:30:42.893331 env[1496]: time="2024-12-13T02:30:42.893313094Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 02:30:42.893516 env[1496]: time="2024-12-13T02:30:42.893505015Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 02:30:42.893618 env[1496]: time="2024-12-13T02:30:42.893608965Z" level=info msg="Daemon has completed initialization" Dec 13 02:30:42.904738 env[1496]: time="2024-12-13T02:30:42.904698988Z" level=info msg="API listen on /run/docker.sock" Dec 13 02:30:42.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:42.905108 systemd[1]: Started docker.service. Dec 13 02:30:43.759009 env[1256]: time="2024-12-13T02:30:43.758975261Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\"" Dec 13 02:30:44.382058 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2139045732.mount: Deactivated successfully. Dec 13 02:30:45.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:45.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:45.447185 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 02:30:45.447311 systemd[1]: Stopped kubelet.service. Dec 13 02:30:45.448334 systemd[1]: Starting kubelet.service... Dec 13 02:30:45.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:45.502924 systemd[1]: Started kubelet.service. Dec 13 02:30:45.537218 kubelet[1623]: E1213 02:30:45.537191 1623 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:30:45.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:30:45.538279 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:30:45.538352 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:30:45.679859 env[1256]: time="2024-12-13T02:30:45.679822212Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:45.702957 env[1256]: time="2024-12-13T02:30:45.702535093Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:45.707398 env[1256]: time="2024-12-13T02:30:45.707382209Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:45.718970 env[1256]: time="2024-12-13T02:30:45.718953385Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ace6a943b058439bd6daeb74f152e7c36e6fc0b5e481cdff9364cd6ca0473e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:45.719710 env[1256]: time="2024-12-13T02:30:45.719686476Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\" returns image reference \"sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e\"" Dec 13 02:30:45.777450 env[1256]: time="2024-12-13T02:30:45.777419004Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\"" Dec 13 02:30:47.131794 update_engine[1245]: I1213 02:30:47.131493 1245 update_attempter.cc:509] Updating boot flags... Dec 13 02:30:47.473960 env[1256]: time="2024-12-13T02:30:47.473876711Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:47.486532 env[1256]: time="2024-12-13T02:30:47.486507022Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:47.493639 env[1256]: time="2024-12-13T02:30:47.493617051Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:47.504744 env[1256]: time="2024-12-13T02:30:47.504696551Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4bd1d4a449e7a1a4f375bd7c71abf48a95f8949b38f725ded255077329f21f7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:47.505648 env[1256]: time="2024-12-13T02:30:47.505305567Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\" returns image reference \"sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079\"" Dec 13 02:30:47.506017 env[1256]: time="2024-12-13T02:30:47.505880033Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\"" Dec 13 02:30:48.941790 env[1256]: time="2024-12-13T02:30:48.941744578Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:48.953257 env[1256]: time="2024-12-13T02:30:48.953229246Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:48.957818 env[1256]: time="2024-12-13T02:30:48.957784399Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:48.962321 env[1256]: time="2024-12-13T02:30:48.962290747Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:1a3081cb7d21763d22eb2c0781cc462d89f501ed523ad558dea1226f128fbfdd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:48.962866 env[1256]: time="2024-12-13T02:30:48.962843391Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\" returns image reference \"sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674\"" Dec 13 02:30:48.963332 env[1256]: time="2024-12-13T02:30:48.963315291Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 02:30:50.970500 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3996607072.mount: Deactivated successfully. Dec 13 02:30:51.554090 env[1256]: time="2024-12-13T02:30:51.554057267Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:51.565863 env[1256]: time="2024-12-13T02:30:51.565842903Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:51.574708 env[1256]: time="2024-12-13T02:30:51.574690995Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:51.581875 env[1256]: time="2024-12-13T02:30:51.581858213Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:51.582091 env[1256]: time="2024-12-13T02:30:51.582064737Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 13 02:30:51.582559 env[1256]: time="2024-12-13T02:30:51.582535580Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 02:30:52.278050 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount986603343.mount: Deactivated successfully. Dec 13 02:30:53.429585 env[1256]: time="2024-12-13T02:30:53.429543530Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:53.453482 env[1256]: time="2024-12-13T02:30:53.453459278Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:53.471328 env[1256]: time="2024-12-13T02:30:53.471303521Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:53.483612 env[1256]: time="2024-12-13T02:30:53.483594918Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:53.484180 env[1256]: time="2024-12-13T02:30:53.484151000Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 02:30:53.484656 env[1256]: time="2024-12-13T02:30:53.484632430Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Dec 13 02:30:54.082846 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1497685684.mount: Deactivated successfully. Dec 13 02:30:54.085191 env[1256]: time="2024-12-13T02:30:54.085150694Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:54.086216 env[1256]: time="2024-12-13T02:30:54.086198221Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:54.087111 env[1256]: time="2024-12-13T02:30:54.087093270Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:54.088012 env[1256]: time="2024-12-13T02:30:54.087993934Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:54.088209 env[1256]: time="2024-12-13T02:30:54.088191112Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Dec 13 02:30:54.088893 env[1256]: time="2024-12-13T02:30:54.088874281Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Dec 13 02:30:54.981361 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3640899265.mount: Deactivated successfully. Dec 13 02:30:55.697289 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Dec 13 02:30:55.697459 systemd[1]: Stopped kubelet.service. Dec 13 02:30:55.708996 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 02:30:55.709076 kernel: audit: type=1130 audit(1734057055.696:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:55.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:55.698828 systemd[1]: Starting kubelet.service... Dec 13 02:30:55.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:55.712175 kernel: audit: type=1131 audit(1734057055.696:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:55.777421 systemd[1]: Started kubelet.service. Dec 13 02:30:55.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:55.781190 kernel: audit: type=1130 audit(1734057055.776:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:55.806171 kubelet[1652]: E1213 02:30:55.806130 1652 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:30:55.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:30:55.810196 kernel: audit: type=1131 audit(1734057055.806:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:30:55.807229 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:30:55.807302 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:30:57.367101 env[1256]: time="2024-12-13T02:30:57.367066388Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:57.381214 env[1256]: time="2024-12-13T02:30:57.381193058Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:57.389871 env[1256]: time="2024-12-13T02:30:57.389856582Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:57.391040 env[1256]: time="2024-12-13T02:30:57.391028179Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:30:57.391476 env[1256]: time="2024-12-13T02:30:57.391461839Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" Dec 13 02:30:59.641505 systemd[1]: Stopped kubelet.service. Dec 13 02:30:59.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:59.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:59.647847 kernel: audit: type=1130 audit(1734057059.640:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:59.647894 kernel: audit: type=1131 audit(1734057059.643:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:30:59.648282 systemd[1]: Starting kubelet.service... Dec 13 02:30:59.668692 systemd[1]: Reloading. Dec 13 02:30:59.727675 /usr/lib/systemd/system-generators/torcx-generator[1701]: time="2024-12-13T02:30:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:30:59.727874 /usr/lib/systemd/system-generators/torcx-generator[1701]: time="2024-12-13T02:30:59Z" level=info msg="torcx already run" Dec 13 02:30:59.782633 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:30:59.782739 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:30:59.794301 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:30:59.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.838862 kernel: audit: type=1400 audit(1734057059.832:264): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.838904 kernel: audit: type=1400 audit(1734057059.832:265): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.841343 kernel: audit: type=1400 audit(1734057059.835:266): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843898 kernel: audit: type=1400 audit(1734057059.835:267): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.838000 audit: BPF prog-id=43 op=LOAD Dec 13 02:30:59.838000 audit: BPF prog-id=27 op=UNLOAD Dec 13 02:30:59.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.840000 audit: BPF prog-id=44 op=LOAD Dec 13 02:30:59.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.840000 audit: BPF prog-id=45 op=LOAD Dec 13 02:30:59.840000 audit: BPF prog-id=28 op=UNLOAD Dec 13 02:30:59.840000 audit: BPF prog-id=29 op=UNLOAD Dec 13 02:30:59.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit: BPF prog-id=46 op=LOAD Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit: BPF prog-id=47 op=LOAD Dec 13 02:30:59.843000 audit: BPF prog-id=30 op=UNLOAD Dec 13 02:30:59.843000 audit: BPF prog-id=31 op=UNLOAD Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.843000 audit: BPF prog-id=48 op=LOAD Dec 13 02:30:59.843000 audit: BPF prog-id=32 op=UNLOAD Dec 13 02:30:59.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.844000 audit: BPF prog-id=49 op=LOAD Dec 13 02:30:59.844000 audit: BPF prog-id=41 op=UNLOAD Dec 13 02:30:59.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.845000 audit: BPF prog-id=50 op=LOAD Dec 13 02:30:59.845000 audit: BPF prog-id=37 op=UNLOAD Dec 13 02:30:59.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.845000 audit: BPF prog-id=51 op=LOAD Dec 13 02:30:59.845000 audit: BPF prog-id=36 op=UNLOAD Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit: BPF prog-id=52 op=LOAD Dec 13 02:30:59.846000 audit: BPF prog-id=33 op=UNLOAD Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit: BPF prog-id=53 op=LOAD Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit: BPF prog-id=54 op=LOAD Dec 13 02:30:59.846000 audit: BPF prog-id=34 op=UNLOAD Dec 13 02:30:59.846000 audit: BPF prog-id=35 op=UNLOAD Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit: BPF prog-id=55 op=LOAD Dec 13 02:30:59.847000 audit: BPF prog-id=38 op=UNLOAD Dec 13 02:30:59.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit: BPF prog-id=56 op=LOAD Dec 13 02:30:59.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:30:59.847000 audit: BPF prog-id=57 op=LOAD Dec 13 02:30:59.847000 audit: BPF prog-id=39 op=UNLOAD Dec 13 02:30:59.847000 audit: BPF prog-id=40 op=UNLOAD Dec 13 02:30:59.899976 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 02:30:59.900024 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 02:30:59.900278 systemd[1]: Stopped kubelet.service. Dec 13 02:30:59.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:30:59.901844 systemd[1]: Starting kubelet.service... Dec 13 02:31:01.240543 kernel: kauditd_printk_skb: 169 callbacks suppressed Dec 13 02:31:01.240592 kernel: audit: type=1130 audit(1734057061.238:437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:31:01.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:31:01.239155 systemd[1]: Started kubelet.service. Dec 13 02:31:01.326440 kubelet[1765]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:31:01.326440 kubelet[1765]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:31:01.326440 kubelet[1765]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:31:01.326680 kubelet[1765]: I1213 02:31:01.326503 1765 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:31:01.675709 kubelet[1765]: I1213 02:31:01.675649 1765 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 02:31:01.675709 kubelet[1765]: I1213 02:31:01.675667 1765 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:31:01.676357 kubelet[1765]: I1213 02:31:01.676346 1765 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 02:31:01.761273 kubelet[1765]: I1213 02:31:01.761255 1765 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:31:01.761914 kubelet[1765]: E1213 02:31:01.761895 1765 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://139.178.70.105:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 139.178.70.105:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:31:01.767431 kubelet[1765]: E1213 02:31:01.767404 1765 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 02:31:01.767431 kubelet[1765]: I1213 02:31:01.767428 1765 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 02:31:01.770139 kubelet[1765]: I1213 02:31:01.770117 1765 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:31:01.770198 kubelet[1765]: I1213 02:31:01.770193 1765 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 02:31:01.770280 kubelet[1765]: I1213 02:31:01.770261 1765 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:31:01.770377 kubelet[1765]: I1213 02:31:01.770277 1765 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 02:31:01.770377 kubelet[1765]: I1213 02:31:01.770378 1765 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:31:01.770493 kubelet[1765]: I1213 02:31:01.770385 1765 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 02:31:01.770493 kubelet[1765]: I1213 02:31:01.770443 1765 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:31:01.776057 kubelet[1765]: I1213 02:31:01.775986 1765 kubelet.go:408] "Attempting to sync node with API server" Dec 13 02:31:01.776057 kubelet[1765]: I1213 02:31:01.776060 1765 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:31:01.776142 kubelet[1765]: I1213 02:31:01.776092 1765 kubelet.go:314] "Adding apiserver pod source" Dec 13 02:31:01.776142 kubelet[1765]: I1213 02:31:01.776106 1765 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:31:01.798096 kubelet[1765]: I1213 02:31:01.798080 1765 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:31:01.799877 kubelet[1765]: I1213 02:31:01.799867 1765 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:31:01.799970 kubelet[1765]: W1213 02:31:01.799962 1765 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 02:31:01.800341 kubelet[1765]: I1213 02:31:01.800333 1765 server.go:1269] "Started kubelet" Dec 13 02:31:01.800484 kubelet[1765]: W1213 02:31:01.800460 1765 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Dec 13 02:31:01.800556 kubelet[1765]: E1213 02:31:01.800542 1765 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://139.178.70.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 139.178.70.105:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:31:01.810955 kubelet[1765]: W1213 02:31:01.810926 1765 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.105:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Dec 13 02:31:01.811095 kubelet[1765]: E1213 02:31:01.811082 1765 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://139.178.70.105:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 139.178.70.105:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:31:01.811188 kubelet[1765]: I1213 02:31:01.811172 1765 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:31:01.814839 kubelet[1765]: I1213 02:31:01.814803 1765 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:31:01.815043 kubelet[1765]: I1213 02:31:01.815030 1765 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:31:01.814000 audit[1765]: AVC avc: denied { mac_admin } for pid=1765 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:01.816009 kubelet[1765]: I1213 02:31:01.815997 1765 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:31:01.816078 kubelet[1765]: I1213 02:31:01.816068 1765 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:31:01.816158 kubelet[1765]: I1213 02:31:01.816151 1765 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:31:01.814000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:31:01.819724 kernel: audit: type=1400 audit(1734057061.814:438): avc: denied { mac_admin } for pid=1765 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:01.819773 kernel: audit: type=1401 audit(1734057061.814:438): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:31:01.819792 kernel: audit: type=1300 audit(1734057061.814:438): arch=c000003e syscall=188 success=no exit=-22 a0=c000c08450 a1=c000c025a0 a2=c000c08420 a3=25 items=0 ppid=1 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:01.814000 audit[1765]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c08450 a1=c000c025a0 a2=c000c08420 a3=25 items=0 ppid=1 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:01.814000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:31:01.827091 kernel: audit: type=1327 audit(1734057061.814:438): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:31:01.827124 kernel: audit: type=1400 audit(1734057061.814:439): avc: denied { mac_admin } for pid=1765 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:01.814000 audit[1765]: AVC avc: denied { mac_admin } for pid=1765 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:01.814000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:31:01.831175 kernel: audit: type=1401 audit(1734057061.814:439): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:31:01.831216 kernel: audit: type=1300 audit(1734057061.814:439): arch=c000003e syscall=188 success=no exit=-22 a0=c000a297c0 a1=c000c025b8 a2=c000c084e0 a3=25 items=0 ppid=1 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:01.814000 audit[1765]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a297c0 a1=c000c025b8 a2=c000c084e0 a3=25 items=0 ppid=1 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:01.814000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:31:01.838167 kernel: audit: type=1327 audit(1734057061.814:439): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:31:01.838428 kubelet[1765]: E1213 02:31:01.830549 1765 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.105:6443/api/v1/namespaces/default/events\": dial tcp 139.178.70.105:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.18109bb5d4dd9d5f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 02:31:01.800320351 +0000 UTC m=+0.556866444,LastTimestamp:2024-12-13 02:31:01.800320351 +0000 UTC m=+0.556866444,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 02:31:01.838681 kubelet[1765]: I1213 02:31:01.838673 1765 server.go:460] "Adding debug handlers to kubelet server" Dec 13 02:31:01.839166 kubelet[1765]: I1213 02:31:01.839148 1765 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 02:31:01.817000 audit[1777]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:01.839481 kubelet[1765]: I1213 02:31:01.839473 1765 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 02:31:01.839632 kubelet[1765]: E1213 02:31:01.839621 1765 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 02:31:01.840557 kubelet[1765]: I1213 02:31:01.840549 1765 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 02:31:01.840636 kubelet[1765]: I1213 02:31:01.840629 1765 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:31:01.817000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdb771e530 a2=0 a3=7ffdb771e51c items=0 ppid=1765 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:01.817000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:31:01.817000 audit[1778]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:01.817000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbae2a760 a2=0 a3=7ffdbae2a74c items=0 ppid=1765 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:01.841251 kernel: audit: type=1325 audit(1734057061.817:440): table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:01.817000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:31:01.840000 audit[1780]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:01.840000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe538b6b00 a2=0 a3=7ffe538b6aec items=0 ppid=1765 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:01.840000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:31:01.844527 kubelet[1765]: E1213 02:31:01.844191 1765 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.105:6443: connect: connection refused" interval="200ms" Dec 13 02:31:01.844527 kubelet[1765]: W1213 02:31:01.844488 1765 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Dec 13 02:31:01.844527 kubelet[1765]: E1213 02:31:01.844514 1765 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://139.178.70.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 139.178.70.105:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:31:01.844605 kubelet[1765]: E1213 02:31:01.844571 1765 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:31:01.844709 kubelet[1765]: I1213 02:31:01.844694 1765 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:31:01.844740 kubelet[1765]: I1213 02:31:01.844733 1765 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:31:01.845220 kubelet[1765]: I1213 02:31:01.845206 1765 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:31:01.845000 audit[1782]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:01.845000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc9d8bfed0 a2=0 a3=7ffc9d8bfebc items=0 ppid=1765 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:01.845000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:31:01.868857 kubelet[1765]: I1213 02:31:01.868839 1765 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:31:01.868857 kubelet[1765]: I1213 02:31:01.868851 1765 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:31:01.868857 kubelet[1765]: I1213 02:31:01.868862 1765 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:31:01.873000 audit[1786]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:01.873000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcf16aaf00 a2=0 a3=7ffcf16aaeec items=0 ppid=1765 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:01.873000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 02:31:01.874965 kubelet[1765]: I1213 02:31:01.874950 1765 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:31:01.874000 audit[1787]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:01.874000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffffc282940 a2=0 a3=7ffffc28292c items=0 ppid=1765 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:01.874000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:31:01.875743 kubelet[1765]: I1213 02:31:01.875730 1765 policy_none.go:49] "None policy: Start" Dec 13 02:31:01.876080 kubelet[1765]: I1213 02:31:01.876069 1765 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:31:01.876080 kubelet[1765]: I1213 02:31:01.876081 1765 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:31:01.875000 audit[1788]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:01.875000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe80ff6bb0 a2=0 a3=10e3 items=0 ppid=1765 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:01.875000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:31:01.876443 kubelet[1765]: I1213 02:31:01.876436 1765 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:31:01.876501 kubelet[1765]: I1213 02:31:01.876495 1765 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:31:01.876557 kubelet[1765]: I1213 02:31:01.876550 1765 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 02:31:01.876624 kubelet[1765]: E1213 02:31:01.876612 1765 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:31:01.876000 audit[1789]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:01.876000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd197a0030 a2=0 a3=7ffd197a001c items=0 ppid=1765 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:01.876000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:31:01.876000 audit[1790]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:01.876000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed2dd7d10 a2=0 a3=7ffed2dd7cfc items=0 ppid=1765 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:01.876000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:31:01.876000 audit[1792]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:01.876000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6ede8100 a2=0 a3=7ffe6ede80ec items=0 ppid=1765 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:01.876000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:31:01.876000 audit[1791]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:01.876000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffea4e1b90 a2=0 a3=7fffea4e1b7c items=0 ppid=1765 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:01.876000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:31:01.878695 kubelet[1765]: W1213 02:31:01.878668 1765 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Dec 13 02:31:01.878737 kubelet[1765]: E1213 02:31:01.878701 1765 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://139.178.70.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 139.178.70.105:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:31:01.878000 audit[1793]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:01.878000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe26b5a160 a2=0 a3=7ffe26b5a14c items=0 ppid=1765 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:01.878000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:31:01.882808 systemd[1]: Created slice kubepods.slice. Dec 13 02:31:01.886393 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 02:31:01.888530 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 02:31:01.894760 kubelet[1765]: I1213 02:31:01.894739 1765 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:31:01.893000 audit[1765]: AVC avc: denied { mac_admin } for pid=1765 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:01.893000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:31:01.893000 audit[1765]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e2c2d0 a1=c000e2a750 a2=c000e2c2a0 a3=25 items=0 ppid=1 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:01.893000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:31:01.895004 kubelet[1765]: I1213 02:31:01.894786 1765 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:31:01.895004 kubelet[1765]: I1213 02:31:01.894998 1765 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 02:31:01.895054 kubelet[1765]: I1213 02:31:01.895008 1765 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:31:01.898932 kubelet[1765]: I1213 02:31:01.898916 1765 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:31:01.899894 kubelet[1765]: E1213 02:31:01.899880 1765 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Dec 13 02:31:01.984128 systemd[1]: Created slice kubepods-burstable-pod3c2e3b84e56471ace4483cba57e4edde.slice. Dec 13 02:31:01.991633 systemd[1]: Created slice kubepods-burstable-pod50a9ae38ddb3bec3278d8dc73a6a7009.slice. Dec 13 02:31:01.995839 kubelet[1765]: I1213 02:31:01.995821 1765 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 02:31:01.996148 kubelet[1765]: E1213 02:31:01.996136 1765 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://139.178.70.105:6443/api/v1/nodes\": dial tcp 139.178.70.105:6443: connect: connection refused" node="localhost" Dec 13 02:31:01.998824 systemd[1]: Created slice kubepods-burstable-poda52b86ce975f496e6002ba953fa9b888.slice. Dec 13 02:31:02.042154 kubelet[1765]: I1213 02:31:02.042129 1765 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3c2e3b84e56471ace4483cba57e4edde-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"3c2e3b84e56471ace4483cba57e4edde\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:31:02.042154 kubelet[1765]: I1213 02:31:02.042154 1765 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:31:02.042274 kubelet[1765]: I1213 02:31:02.042173 1765 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:31:02.042274 kubelet[1765]: I1213 02:31:02.042183 1765 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:31:02.042274 kubelet[1765]: I1213 02:31:02.042192 1765 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:31:02.042274 kubelet[1765]: I1213 02:31:02.042201 1765 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:31:02.042274 kubelet[1765]: I1213 02:31:02.042209 1765 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3c2e3b84e56471ace4483cba57e4edde-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"3c2e3b84e56471ace4483cba57e4edde\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:31:02.042375 kubelet[1765]: I1213 02:31:02.042223 1765 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3c2e3b84e56471ace4483cba57e4edde-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"3c2e3b84e56471ace4483cba57e4edde\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:31:02.042375 kubelet[1765]: I1213 02:31:02.042337 1765 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a52b86ce975f496e6002ba953fa9b888-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"a52b86ce975f496e6002ba953fa9b888\") " pod="kube-system/kube-scheduler-localhost" Dec 13 02:31:02.044576 kubelet[1765]: E1213 02:31:02.044556 1765 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.105:6443: connect: connection refused" interval="400ms" Dec 13 02:31:02.198057 kubelet[1765]: I1213 02:31:02.198030 1765 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 02:31:02.198345 kubelet[1765]: E1213 02:31:02.198307 1765 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://139.178.70.105:6443/api/v1/nodes\": dial tcp 139.178.70.105:6443: connect: connection refused" node="localhost" Dec 13 02:31:02.291077 env[1256]: time="2024-12-13T02:31:02.290753132Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:3c2e3b84e56471ace4483cba57e4edde,Namespace:kube-system,Attempt:0,}" Dec 13 02:31:02.298985 env[1256]: time="2024-12-13T02:31:02.298804523Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:50a9ae38ddb3bec3278d8dc73a6a7009,Namespace:kube-system,Attempt:0,}" Dec 13 02:31:02.301633 env[1256]: time="2024-12-13T02:31:02.301609404Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:a52b86ce975f496e6002ba953fa9b888,Namespace:kube-system,Attempt:0,}" Dec 13 02:31:02.400568 kubelet[1765]: E1213 02:31:02.400461 1765 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.105:6443/api/v1/namespaces/default/events\": dial tcp 139.178.70.105:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.18109bb5d4dd9d5f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 02:31:01.800320351 +0000 UTC m=+0.556866444,LastTimestamp:2024-12-13 02:31:01.800320351 +0000 UTC m=+0.556866444,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 02:31:02.445178 kubelet[1765]: E1213 02:31:02.445115 1765 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.105:6443: connect: connection refused" interval="800ms" Dec 13 02:31:02.599742 kubelet[1765]: I1213 02:31:02.599685 1765 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 02:31:02.600151 kubelet[1765]: E1213 02:31:02.600130 1765 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://139.178.70.105:6443/api/v1/nodes\": dial tcp 139.178.70.105:6443: connect: connection refused" node="localhost" Dec 13 02:31:02.680033 kubelet[1765]: W1213 02:31:02.679983 1765 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.105:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Dec 13 02:31:02.680137 kubelet[1765]: E1213 02:31:02.680038 1765 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://139.178.70.105:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 139.178.70.105:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:31:02.738615 kubelet[1765]: W1213 02:31:02.738550 1765 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Dec 13 02:31:02.738615 kubelet[1765]: E1213 02:31:02.738610 1765 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://139.178.70.105:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 139.178.70.105:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:31:02.762550 kubelet[1765]: W1213 02:31:02.762495 1765 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Dec 13 02:31:02.762652 kubelet[1765]: E1213 02:31:02.762559 1765 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://139.178.70.105:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 139.178.70.105:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:31:02.827588 kubelet[1765]: W1213 02:31:02.827517 1765 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.105:6443: connect: connection refused Dec 13 02:31:02.827588 kubelet[1765]: E1213 02:31:02.827566 1765 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://139.178.70.105:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 139.178.70.105:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:31:02.901374 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1205471697.mount: Deactivated successfully. Dec 13 02:31:02.905047 env[1256]: time="2024-12-13T02:31:02.905017810Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:02.906449 env[1256]: time="2024-12-13T02:31:02.906432188Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:02.907087 env[1256]: time="2024-12-13T02:31:02.907070687Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:02.907701 env[1256]: time="2024-12-13T02:31:02.907684572Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:02.910045 env[1256]: time="2024-12-13T02:31:02.910026614Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:02.912066 env[1256]: time="2024-12-13T02:31:02.912051656Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:02.912690 env[1256]: time="2024-12-13T02:31:02.912673830Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:02.913345 env[1256]: time="2024-12-13T02:31:02.913329024Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:02.914037 env[1256]: time="2024-12-13T02:31:02.914016347Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:02.914671 env[1256]: time="2024-12-13T02:31:02.914657298Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:02.919095 env[1256]: time="2024-12-13T02:31:02.918232136Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:02.929228 env[1256]: time="2024-12-13T02:31:02.929202347Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:02.930348 env[1256]: time="2024-12-13T02:31:02.930251397Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:31:02.930348 env[1256]: time="2024-12-13T02:31:02.930277400Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:31:02.930348 env[1256]: time="2024-12-13T02:31:02.930284679Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:31:02.930486 env[1256]: time="2024-12-13T02:31:02.930359095Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/511a457cfcbc35ae4ffdeb69a3e8d644fab3f9ec44b830cf83e2c077d7ab6654 pid=1802 runtime=io.containerd.runc.v2 Dec 13 02:31:02.936134 env[1256]: time="2024-12-13T02:31:02.936103300Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:31:02.936266 env[1256]: time="2024-12-13T02:31:02.936248380Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:31:02.936356 env[1256]: time="2024-12-13T02:31:02.936339099Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:31:02.936512 env[1256]: time="2024-12-13T02:31:02.936492258Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f5424f77c78976b4a624be9131edf2b16979187e91a9a9c88d2f009e04b3d384 pid=1821 runtime=io.containerd.runc.v2 Dec 13 02:31:02.951717 env[1256]: time="2024-12-13T02:31:02.951680268Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:31:02.951813 env[1256]: time="2024-12-13T02:31:02.951713420Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:31:02.951813 env[1256]: time="2024-12-13T02:31:02.951721967Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:31:02.951813 env[1256]: time="2024-12-13T02:31:02.951791348Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/af084f79487aee9ba97984e3a10f8a0d71752b1d62cb1fb7ee65e12866f3305f pid=1852 runtime=io.containerd.runc.v2 Dec 13 02:31:02.961109 systemd[1]: Started cri-containerd-511a457cfcbc35ae4ffdeb69a3e8d644fab3f9ec44b830cf83e2c077d7ab6654.scope. Dec 13 02:31:02.967598 systemd[1]: Started cri-containerd-af084f79487aee9ba97984e3a10f8a0d71752b1d62cb1fb7ee65e12866f3305f.scope. Dec 13 02:31:02.978581 systemd[1]: Started cri-containerd-f5424f77c78976b4a624be9131edf2b16979187e91a9a9c88d2f009e04b3d384.scope. Dec 13 02:31:02.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.981000 audit: BPF prog-id=58 op=LOAD Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1802 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:02.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531316134353763666362633335616534666664656236396133653864 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1802 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:02.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531316134353763666362633335616534666664656236396133653864 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit: BPF prog-id=59 op=LOAD Dec 13 02:31:02.983000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00029bb00 items=0 ppid=1802 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:02.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531316134353763666362633335616534666664656236396133653864 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit: BPF prog-id=60 op=LOAD Dec 13 02:31:02.983000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00029bb48 items=0 ppid=1802 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:02.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531316134353763666362633335616534666664656236396133653864 Dec 13 02:31:02.983000 audit: BPF prog-id=60 op=UNLOAD Dec 13 02:31:02.983000 audit: BPF prog-id=59 op=UNLOAD Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.983000 audit: BPF prog-id=61 op=LOAD Dec 13 02:31:02.983000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00029bf58 items=0 ppid=1802 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:02.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531316134353763666362633335616534666664656236396133653864 Dec 13 02:31:02.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit: BPF prog-id=62 op=LOAD Dec 13 02:31:02.988000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1852 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:02.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166303834663739343837616565396261393739383465336131306638 Dec 13 02:31:02.988000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1852 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:02.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166303834663739343837616565396261393739383465336131306638 Dec 13 02:31:02.988000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.988000 audit: BPF prog-id=63 op=LOAD Dec 13 02:31:02.988000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024530 items=0 ppid=1852 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:02.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166303834663739343837616565396261393739383465336131306638 Dec 13 02:31:02.989000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.989000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.989000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.989000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.989000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.989000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.989000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.989000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.989000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.989000 audit: BPF prog-id=64 op=LOAD Dec 13 02:31:02.989000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024578 items=0 ppid=1852 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:02.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166303834663739343837616565396261393739383465336131306638 Dec 13 02:31:02.989000 audit: BPF prog-id=64 op=UNLOAD Dec 13 02:31:02.989000 audit: BPF prog-id=63 op=UNLOAD Dec 13 02:31:02.989000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.989000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.989000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.989000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.989000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.989000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.989000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.989000 audit[1867]: AVC avc: denied { perfmon } for pid=1867 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.989000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.989000 audit[1867]: AVC avc: denied { bpf } for pid=1867 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.989000 audit: BPF prog-id=65 op=LOAD Dec 13 02:31:02.989000 audit[1867]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024988 items=0 ppid=1852 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:02.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166303834663739343837616565396261393739383465336131306638 Dec 13 02:31:02.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.993000 audit: BPF prog-id=66 op=LOAD Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit[1833]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1821 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:02.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343234663737633738393736623461363234626539313331656466 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit[1833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1821 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:02.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343234663737633738393736623461363234626539313331656466 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit: BPF prog-id=67 op=LOAD Dec 13 02:31:02.994000 audit[1833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000253dc0 items=0 ppid=1821 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:02.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343234663737633738393736623461363234626539313331656466 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.994000 audit: BPF prog-id=68 op=LOAD Dec 13 02:31:02.994000 audit[1833]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000253e08 items=0 ppid=1821 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:02.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343234663737633738393736623461363234626539313331656466 Dec 13 02:31:02.995000 audit: BPF prog-id=68 op=UNLOAD Dec 13 02:31:02.995000 audit: BPF prog-id=67 op=UNLOAD Dec 13 02:31:02.995000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.995000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.995000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.995000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.995000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.995000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.995000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.995000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.995000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.995000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:02.995000 audit: BPF prog-id=69 op=LOAD Dec 13 02:31:02.995000 audit[1833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003c8218 items=0 ppid=1821 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:02.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635343234663737633738393736623461363234626539313331656466 Dec 13 02:31:03.022347 env[1256]: time="2024-12-13T02:31:03.022325315Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:50a9ae38ddb3bec3278d8dc73a6a7009,Namespace:kube-system,Attempt:0,} returns sandbox id \"af084f79487aee9ba97984e3a10f8a0d71752b1d62cb1fb7ee65e12866f3305f\"" Dec 13 02:31:03.022740 env[1256]: time="2024-12-13T02:31:03.022647944Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:a52b86ce975f496e6002ba953fa9b888,Namespace:kube-system,Attempt:0,} returns sandbox id \"511a457cfcbc35ae4ffdeb69a3e8d644fab3f9ec44b830cf83e2c077d7ab6654\"" Dec 13 02:31:03.024230 env[1256]: time="2024-12-13T02:31:03.024212551Z" level=info msg="CreateContainer within sandbox \"511a457cfcbc35ae4ffdeb69a3e8d644fab3f9ec44b830cf83e2c077d7ab6654\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 02:31:03.026125 env[1256]: time="2024-12-13T02:31:03.026106109Z" level=info msg="CreateContainer within sandbox \"af084f79487aee9ba97984e3a10f8a0d71752b1d62cb1fb7ee65e12866f3305f\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 02:31:03.034880 env[1256]: time="2024-12-13T02:31:03.034850834Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:3c2e3b84e56471ace4483cba57e4edde,Namespace:kube-system,Attempt:0,} returns sandbox id \"f5424f77c78976b4a624be9131edf2b16979187e91a9a9c88d2f009e04b3d384\"" Dec 13 02:31:03.036327 env[1256]: time="2024-12-13T02:31:03.036304422Z" level=info msg="CreateContainer within sandbox \"f5424f77c78976b4a624be9131edf2b16979187e91a9a9c88d2f009e04b3d384\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 02:31:03.037724 env[1256]: time="2024-12-13T02:31:03.037702234Z" level=info msg="CreateContainer within sandbox \"511a457cfcbc35ae4ffdeb69a3e8d644fab3f9ec44b830cf83e2c077d7ab6654\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"5b870c64cd09bfd7a48d56a1c3787a917602292abe90008fbb0a09758dc0d795\"" Dec 13 02:31:03.037940 env[1256]: time="2024-12-13T02:31:03.037906781Z" level=info msg="CreateContainer within sandbox \"af084f79487aee9ba97984e3a10f8a0d71752b1d62cb1fb7ee65e12866f3305f\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"e1491fb796bb25cfdb6416ecba2ac8d4bd53b8bace823df9673aff2f5e927f9a\"" Dec 13 02:31:03.038825 env[1256]: time="2024-12-13T02:31:03.038809509Z" level=info msg="StartContainer for \"5b870c64cd09bfd7a48d56a1c3787a917602292abe90008fbb0a09758dc0d795\"" Dec 13 02:31:03.039048 env[1256]: time="2024-12-13T02:31:03.038885388Z" level=info msg="StartContainer for \"e1491fb796bb25cfdb6416ecba2ac8d4bd53b8bace823df9673aff2f5e927f9a\"" Dec 13 02:31:03.050697 systemd[1]: Started cri-containerd-5b870c64cd09bfd7a48d56a1c3787a917602292abe90008fbb0a09758dc0d795.scope. Dec 13 02:31:03.058664 systemd[1]: Started cri-containerd-e1491fb796bb25cfdb6416ecba2ac8d4bd53b8bace823df9673aff2f5e927f9a.scope. Dec 13 02:31:03.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit: BPF prog-id=70 op=LOAD Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1802 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:03.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562383730633634636430396266643761343864353661316333373837 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1802 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:03.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562383730633634636430396266643761343864353661316333373837 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit: BPF prog-id=71 op=LOAD Dec 13 02:31:03.063000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002171d0 items=0 ppid=1802 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:03.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562383730633634636430396266643761343864353661316333373837 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit: BPF prog-id=72 op=LOAD Dec 13 02:31:03.063000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000217218 items=0 ppid=1802 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:03.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562383730633634636430396266643761343864353661316333373837 Dec 13 02:31:03.063000 audit: BPF prog-id=72 op=UNLOAD Dec 13 02:31:03.063000 audit: BPF prog-id=71 op=UNLOAD Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { perfmon } for pid=1939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit[1939]: AVC avc: denied { bpf } for pid=1939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.063000 audit: BPF prog-id=73 op=LOAD Dec 13 02:31:03.063000 audit[1939]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000217628 items=0 ppid=1802 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:03.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562383730633634636430396266643761343864353661316333373837 Dec 13 02:31:03.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.065000 audit: BPF prog-id=74 op=LOAD Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1852 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:03.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531343931666237393662623235636664623634313665636261326163 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1852 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:03.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531343931666237393662623235636664623634313665636261326163 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit: BPF prog-id=75 op=LOAD Dec 13 02:31:03.066000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000216a50 items=0 ppid=1852 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:03.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531343931666237393662623235636664623634313665636261326163 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit: BPF prog-id=76 op=LOAD Dec 13 02:31:03.066000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000216a98 items=0 ppid=1852 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:03.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531343931666237393662623235636664623634313665636261326163 Dec 13 02:31:03.066000 audit: BPF prog-id=76 op=UNLOAD Dec 13 02:31:03.066000 audit: BPF prog-id=75 op=UNLOAD Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.066000 audit: BPF prog-id=77 op=LOAD Dec 13 02:31:03.066000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000216ea8 items=0 ppid=1852 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:03.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531343931666237393662623235636664623634313665636261326163 Dec 13 02:31:03.095280 env[1256]: time="2024-12-13T02:31:03.095253554Z" level=info msg="StartContainer for \"5b870c64cd09bfd7a48d56a1c3787a917602292abe90008fbb0a09758dc0d795\" returns successfully" Dec 13 02:31:03.095513 env[1256]: time="2024-12-13T02:31:03.095498986Z" level=info msg="StartContainer for \"e1491fb796bb25cfdb6416ecba2ac8d4bd53b8bace823df9673aff2f5e927f9a\" returns successfully" Dec 13 02:31:03.111887 env[1256]: time="2024-12-13T02:31:03.111852730Z" level=info msg="CreateContainer within sandbox \"f5424f77c78976b4a624be9131edf2b16979187e91a9a9c88d2f009e04b3d384\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"e3d288b9ebfa87781da7da6c48e85ec2bc80fce175abbe885790e03b62825696\"" Dec 13 02:31:03.112329 env[1256]: time="2024-12-13T02:31:03.112314821Z" level=info msg="StartContainer for \"e3d288b9ebfa87781da7da6c48e85ec2bc80fce175abbe885790e03b62825696\"" Dec 13 02:31:03.124837 systemd[1]: Started cri-containerd-e3d288b9ebfa87781da7da6c48e85ec2bc80fce175abbe885790e03b62825696.scope. Dec 13 02:31:03.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.135000 audit: BPF prog-id=78 op=LOAD Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1821 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:03.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533643238386239656266613837373831646137646136633438653835 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1821 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:03.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533643238386239656266613837373831646137646136633438653835 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit: BPF prog-id=79 op=LOAD Dec 13 02:31:03.136000 audit[2000]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001fbdc0 items=0 ppid=1821 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:03.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533643238386239656266613837373831646137646136633438653835 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit: BPF prog-id=80 op=LOAD Dec 13 02:31:03.136000 audit[2000]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001fbe08 items=0 ppid=1821 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:03.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533643238386239656266613837373831646137646136633438653835 Dec 13 02:31:03.136000 audit: BPF prog-id=80 op=UNLOAD Dec 13 02:31:03.136000 audit: BPF prog-id=79 op=UNLOAD Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { perfmon } for pid=2000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit[2000]: AVC avc: denied { bpf } for pid=2000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:03.136000 audit: BPF prog-id=81 op=LOAD Dec 13 02:31:03.136000 audit[2000]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000374218 items=0 ppid=1821 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:03.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533643238386239656266613837373831646137646136633438653835 Dec 13 02:31:03.174038 env[1256]: time="2024-12-13T02:31:03.173982445Z" level=info msg="StartContainer for \"e3d288b9ebfa87781da7da6c48e85ec2bc80fce175abbe885790e03b62825696\" returns successfully" Dec 13 02:31:03.245751 kubelet[1765]: E1213 02:31:03.245712 1765 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.105:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.105:6443: connect: connection refused" interval="1.6s" Dec 13 02:31:03.401353 kubelet[1765]: I1213 02:31:03.401337 1765 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 02:31:03.401564 kubelet[1765]: E1213 02:31:03.401507 1765 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://139.178.70.105:6443/api/v1/nodes\": dial tcp 139.178.70.105:6443: connect: connection refused" node="localhost" Dec 13 02:31:03.739000 audit[1967]: AVC avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:03.739000 audit[1967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000afc060 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:31:03.739000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:31:03.739000 audit[1967]: AVC avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:03.739000 audit[1967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0004621c0 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:31:03.739000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:31:03.773835 kubelet[1765]: E1213 02:31:03.773802 1765 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://139.178.70.105:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 139.178.70.105:6443: connect: connection refused" logger="UnhandledError" Dec 13 02:31:05.002463 kubelet[1765]: I1213 02:31:05.002441 1765 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 02:31:05.090000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:05.090000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c005d5f3b0 a2=fc6 a3=0 items=0 ppid=1821 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 key=(null) Dec 13 02:31:05.090000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7294 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:05.090000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c0084e9440 a2=fc6 a3=0 items=0 ppid=1821 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 key=(null) Dec 13 02:31:05.090000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:31:05.090000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:31:05.091000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:05.091000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=54 a1=c0041eb540 a2=fc6 a3=0 items=0 ppid=1821 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 key=(null) Dec 13 02:31:05.091000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:31:05.099000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:05.099000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=56 a1=c005d5f800 a2=fc6 a3=0 items=0 ppid=1821 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 key=(null) Dec 13 02:31:05.099000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:31:05.105000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:05.105000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=58 a1=c0041eb9c0 a2=fc6 a3=0 items=0 ppid=1821 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 key=(null) Dec 13 02:31:05.105000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:31:05.106000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:05.106000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=58 a1=c005d5fb00 a2=fc6 a3=0 items=0 ppid=1821 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 key=(null) Dec 13 02:31:05.106000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:31:05.176245 kubelet[1765]: E1213 02:31:05.176220 1765 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Dec 13 02:31:05.248146 kubelet[1765]: I1213 02:31:05.248104 1765 kubelet_node_status.go:75] "Successfully registered node" node="localhost" Dec 13 02:31:05.248320 kubelet[1765]: E1213 02:31:05.248258 1765 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" Dec 13 02:31:05.812191 kubelet[1765]: I1213 02:31:05.812160 1765 apiserver.go:52] "Watching apiserver" Dec 13 02:31:05.841535 kubelet[1765]: I1213 02:31:05.841519 1765 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 02:31:05.892781 kubelet[1765]: E1213 02:31:05.892761 1765 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" Dec 13 02:31:06.930583 systemd[1]: Reloading. Dec 13 02:31:06.983733 /usr/lib/systemd/system-generators/torcx-generator[2054]: time="2024-12-13T02:31:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:31:06.983749 /usr/lib/systemd/system-generators/torcx-generator[2054]: time="2024-12-13T02:31:06Z" level=info msg="torcx already run" Dec 13 02:31:07.037763 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:31:07.037876 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:31:07.049718 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:31:07.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.100517 kernel: kauditd_printk_skb: 405 callbacks suppressed Dec 13 02:31:07.100570 kernel: audit: type=1400 audit(1734057067.096:569): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.100589 kernel: audit: type=1400 audit(1734057067.096:570): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.105359 kernel: audit: type=1400 audit(1734057067.096:571): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.107830 kernel: audit: type=1400 audit(1734057067.096:572): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.107908 kernel: audit: type=1400 audit(1734057067.096:573): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.112700 kernel: audit: type=1400 audit(1734057067.096:574): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.112734 kernel: audit: type=1400 audit(1734057067.096:575): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.117519 kernel: audit: type=1400 audit(1734057067.096:576): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.117556 kernel: audit: type=1400 audit(1734057067.096:577): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.122289 kernel: audit: type=1400 audit(1734057067.101:578): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.101000 audit: BPF prog-id=82 op=LOAD Dec 13 02:31:07.101000 audit: BPF prog-id=70 op=UNLOAD Dec 13 02:31:07.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.106000 audit: BPF prog-id=83 op=LOAD Dec 13 02:31:07.106000 audit: BPF prog-id=43 op=UNLOAD Dec 13 02:31:07.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.109000 audit: BPF prog-id=84 op=LOAD Dec 13 02:31:07.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.113000 audit: BPF prog-id=85 op=LOAD Dec 13 02:31:07.116000 audit: BPF prog-id=44 op=UNLOAD Dec 13 02:31:07.116000 audit: BPF prog-id=45 op=UNLOAD Dec 13 02:31:07.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.118000 audit: BPF prog-id=86 op=LOAD Dec 13 02:31:07.118000 audit: BPF prog-id=78 op=UNLOAD Dec 13 02:31:07.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.122000 audit: BPF prog-id=87 op=LOAD Dec 13 02:31:07.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.122000 audit: BPF prog-id=88 op=LOAD Dec 13 02:31:07.122000 audit: BPF prog-id=46 op=UNLOAD Dec 13 02:31:07.122000 audit: BPF prog-id=47 op=UNLOAD Dec 13 02:31:07.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.123000 audit: BPF prog-id=89 op=LOAD Dec 13 02:31:07.123000 audit: BPF prog-id=48 op=UNLOAD Dec 13 02:31:07.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.124000 audit: BPF prog-id=90 op=LOAD Dec 13 02:31:07.124000 audit: BPF prog-id=49 op=UNLOAD Dec 13 02:31:07.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.125000 audit: BPF prog-id=91 op=LOAD Dec 13 02:31:07.125000 audit: BPF prog-id=50 op=UNLOAD Dec 13 02:31:07.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.126000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.126000 audit: BPF prog-id=92 op=LOAD Dec 13 02:31:07.127000 audit: BPF prog-id=74 op=UNLOAD Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit: BPF prog-id=93 op=LOAD Dec 13 02:31:07.127000 audit: BPF prog-id=51 op=UNLOAD Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit: BPF prog-id=94 op=LOAD Dec 13 02:31:07.127000 audit: BPF prog-id=58 op=UNLOAD Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.127000 audit: BPF prog-id=95 op=LOAD Dec 13 02:31:07.127000 audit: BPF prog-id=66 op=UNLOAD Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit: BPF prog-id=96 op=LOAD Dec 13 02:31:07.128000 audit: BPF prog-id=62 op=UNLOAD Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit: BPF prog-id=97 op=LOAD Dec 13 02:31:07.128000 audit: BPF prog-id=52 op=UNLOAD Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit: BPF prog-id=98 op=LOAD Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.128000 audit: BPF prog-id=99 op=LOAD Dec 13 02:31:07.128000 audit: BPF prog-id=53 op=UNLOAD Dec 13 02:31:07.128000 audit: BPF prog-id=54 op=UNLOAD Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit: BPF prog-id=100 op=LOAD Dec 13 02:31:07.129000 audit: BPF prog-id=55 op=UNLOAD Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit: BPF prog-id=101 op=LOAD Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:07.129000 audit: BPF prog-id=102 op=LOAD Dec 13 02:31:07.129000 audit: BPF prog-id=56 op=UNLOAD Dec 13 02:31:07.129000 audit: BPF prog-id=57 op=UNLOAD Dec 13 02:31:07.142972 kubelet[1765]: I1213 02:31:07.142877 1765 dynamic_cafile_content.go:174] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:31:07.144090 systemd[1]: Stopping kubelet.service... Dec 13 02:31:07.160338 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 02:31:07.160452 systemd[1]: Stopped kubelet.service. Dec 13 02:31:07.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:31:07.161833 systemd[1]: Starting kubelet.service... Dec 13 02:31:07.960000 audit[1967]: AVC avc: denied { watch } for pid=1967 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7330 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 02:31:07.960000 audit[1967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0008d6000 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:31:07.960000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:31:08.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:31:08.002478 systemd[1]: Started kubelet.service. Dec 13 02:31:08.084588 kubelet[2118]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:31:08.084833 kubelet[2118]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:31:08.084885 kubelet[2118]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:31:08.084997 kubelet[2118]: I1213 02:31:08.084978 2118 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:31:08.089892 kubelet[2118]: I1213 02:31:08.089873 2118 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 02:31:08.089892 kubelet[2118]: I1213 02:31:08.089887 2118 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:31:08.090128 kubelet[2118]: I1213 02:31:08.090116 2118 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 02:31:08.091481 kubelet[2118]: I1213 02:31:08.091470 2118 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 02:31:08.111785 kubelet[2118]: I1213 02:31:08.111766 2118 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:31:08.118845 kubelet[2118]: E1213 02:31:08.118799 2118 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 02:31:08.118949 kubelet[2118]: I1213 02:31:08.118941 2118 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 02:31:08.120777 kubelet[2118]: I1213 02:31:08.120765 2118 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:31:08.120904 kubelet[2118]: I1213 02:31:08.120895 2118 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 02:31:08.121051 kubelet[2118]: I1213 02:31:08.121034 2118 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:31:08.121210 kubelet[2118]: I1213 02:31:08.121092 2118 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 02:31:08.121356 kubelet[2118]: I1213 02:31:08.121347 2118 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:31:08.121400 kubelet[2118]: I1213 02:31:08.121394 2118 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 02:31:08.121463 kubelet[2118]: I1213 02:31:08.121456 2118 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:31:08.121589 kubelet[2118]: I1213 02:31:08.121573 2118 kubelet.go:408] "Attempting to sync node with API server" Dec 13 02:31:08.121633 kubelet[2118]: I1213 02:31:08.121626 2118 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:31:08.121688 kubelet[2118]: I1213 02:31:08.121681 2118 kubelet.go:314] "Adding apiserver pod source" Dec 13 02:31:08.121736 kubelet[2118]: I1213 02:31:08.121730 2118 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:31:08.124464 kubelet[2118]: I1213 02:31:08.124450 2118 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:31:08.124787 kubelet[2118]: I1213 02:31:08.124779 2118 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:31:08.125091 kubelet[2118]: I1213 02:31:08.125082 2118 server.go:1269] "Started kubelet" Dec 13 02:31:08.126433 kubelet[2118]: I1213 02:31:08.126421 2118 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:31:08.125000 audit[2118]: AVC avc: denied { mac_admin } for pid=2118 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:08.125000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:31:08.125000 audit[2118]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007476b0 a1=c000be6168 a2=c000747680 a3=25 items=0 ppid=1 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:08.125000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:31:08.126000 audit[2118]: AVC avc: denied { mac_admin } for pid=2118 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:08.126000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:31:08.126000 audit[2118]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000baa5c0 a1=c000be6180 a2=c000747740 a3=25 items=0 ppid=1 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:08.126000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:31:08.128266 kubelet[2118]: I1213 02:31:08.128255 2118 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:31:08.128328 kubelet[2118]: I1213 02:31:08.128321 2118 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:31:08.135129 kubelet[2118]: I1213 02:31:08.134487 2118 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:31:08.135256 kubelet[2118]: I1213 02:31:08.135244 2118 server.go:460] "Adding debug handlers to kubelet server" Dec 13 02:31:08.137194 kubelet[2118]: E1213 02:31:08.137182 2118 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:31:08.137755 kubelet[2118]: I1213 02:31:08.137727 2118 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:31:08.137851 kubelet[2118]: I1213 02:31:08.137839 2118 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:31:08.139506 kubelet[2118]: I1213 02:31:08.139491 2118 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 02:31:08.141275 kubelet[2118]: I1213 02:31:08.141251 2118 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 02:31:08.141498 kubelet[2118]: E1213 02:31:08.141488 2118 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 02:31:08.146758 kubelet[2118]: I1213 02:31:08.146742 2118 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 02:31:08.146917 kubelet[2118]: I1213 02:31:08.146910 2118 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:31:08.153047 kubelet[2118]: I1213 02:31:08.153016 2118 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:31:08.153241 kubelet[2118]: I1213 02:31:08.153220 2118 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:31:08.156151 kubelet[2118]: I1213 02:31:08.156138 2118 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:31:08.164659 kubelet[2118]: I1213 02:31:08.164636 2118 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:31:08.165845 kubelet[2118]: I1213 02:31:08.165835 2118 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:31:08.165921 kubelet[2118]: I1213 02:31:08.165914 2118 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:31:08.165986 kubelet[2118]: I1213 02:31:08.165979 2118 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 02:31:08.166073 kubelet[2118]: E1213 02:31:08.166061 2118 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:31:08.201473 kubelet[2118]: I1213 02:31:08.201338 2118 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:31:08.201473 kubelet[2118]: I1213 02:31:08.201350 2118 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:31:08.201473 kubelet[2118]: I1213 02:31:08.201360 2118 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:31:08.202344 kubelet[2118]: I1213 02:31:08.201620 2118 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 02:31:08.202344 kubelet[2118]: I1213 02:31:08.201627 2118 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 02:31:08.202344 kubelet[2118]: I1213 02:31:08.201637 2118 policy_none.go:49] "None policy: Start" Dec 13 02:31:08.202344 kubelet[2118]: I1213 02:31:08.201962 2118 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:31:08.202344 kubelet[2118]: I1213 02:31:08.201973 2118 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:31:08.202344 kubelet[2118]: I1213 02:31:08.202052 2118 state_mem.go:75] "Updated machine memory state" Dec 13 02:31:08.204278 kubelet[2118]: I1213 02:31:08.204263 2118 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:31:08.203000 audit[2118]: AVC avc: denied { mac_admin } for pid=2118 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:08.203000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:31:08.203000 audit[2118]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a737d0 a1=c000f4b8f0 a2=c000a737a0 a3=25 items=0 ppid=1 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:08.203000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:31:08.204437 kubelet[2118]: I1213 02:31:08.204306 2118 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:31:08.204437 kubelet[2118]: I1213 02:31:08.204377 2118 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 02:31:08.204437 kubelet[2118]: I1213 02:31:08.204383 2118 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:31:08.204687 kubelet[2118]: I1213 02:31:08.204623 2118 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:31:08.306382 kubelet[2118]: I1213 02:31:08.306054 2118 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 02:31:08.312622 kubelet[2118]: I1213 02:31:08.312182 2118 kubelet_node_status.go:111] "Node was previously registered" node="localhost" Dec 13 02:31:08.312622 kubelet[2118]: I1213 02:31:08.312250 2118 kubelet_node_status.go:75] "Successfully registered node" node="localhost" Dec 13 02:31:08.448372 kubelet[2118]: I1213 02:31:08.448341 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:31:08.448472 kubelet[2118]: I1213 02:31:08.448379 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:31:08.448472 kubelet[2118]: I1213 02:31:08.448402 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:31:08.448472 kubelet[2118]: I1213 02:31:08.448434 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:31:08.448472 kubelet[2118]: I1213 02:31:08.448451 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a52b86ce975f496e6002ba953fa9b888-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"a52b86ce975f496e6002ba953fa9b888\") " pod="kube-system/kube-scheduler-localhost" Dec 13 02:31:08.448472 kubelet[2118]: I1213 02:31:08.448467 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3c2e3b84e56471ace4483cba57e4edde-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"3c2e3b84e56471ace4483cba57e4edde\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:31:08.448579 kubelet[2118]: I1213 02:31:08.448482 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3c2e3b84e56471ace4483cba57e4edde-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"3c2e3b84e56471ace4483cba57e4edde\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:31:08.448579 kubelet[2118]: I1213 02:31:08.448509 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3c2e3b84e56471ace4483cba57e4edde-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"3c2e3b84e56471ace4483cba57e4edde\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:31:08.448579 kubelet[2118]: I1213 02:31:08.448528 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:31:09.130249 kubelet[2118]: I1213 02:31:09.130215 2118 apiserver.go:52] "Watching apiserver" Dec 13 02:31:09.147249 kubelet[2118]: I1213 02:31:09.147220 2118 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 02:31:09.218881 kubelet[2118]: E1213 02:31:09.218856 2118 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Dec 13 02:31:09.240883 kubelet[2118]: I1213 02:31:09.240837 2118 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.240825972 podStartE2EDuration="1.240825972s" podCreationTimestamp="2024-12-13 02:31:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:31:09.226872633 +0000 UTC m=+1.205975108" watchObservedRunningTime="2024-12-13 02:31:09.240825972 +0000 UTC m=+1.219928435" Dec 13 02:31:09.273782 kubelet[2118]: I1213 02:31:09.273748 2118 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.273734232 podStartE2EDuration="1.273734232s" podCreationTimestamp="2024-12-13 02:31:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:31:09.240956185 +0000 UTC m=+1.220058661" watchObservedRunningTime="2024-12-13 02:31:09.273734232 +0000 UTC m=+1.252836701" Dec 13 02:31:09.305101 kubelet[2118]: I1213 02:31:09.305061 2118 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.305049978 podStartE2EDuration="1.305049978s" podCreationTimestamp="2024-12-13 02:31:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:31:09.274474675 +0000 UTC m=+1.253577146" watchObservedRunningTime="2024-12-13 02:31:09.305049978 +0000 UTC m=+1.284152449" Dec 13 02:31:11.811000 audit[1967]: AVC avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:11.811000 audit[1967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0000e9fe0 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:31:11.811000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:31:11.811000 audit[1967]: AVC avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:11.811000 audit[1967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000aa0300 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:31:11.811000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:31:11.812000 audit[1967]: AVC avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:11.812000 audit[1967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b5d0e0 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:31:11.812000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:31:11.812000 audit[1967]: AVC avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:31:11.812000 audit[1967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000aa04c0 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:31:11.812000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:31:12.235467 sudo[1486]: pam_unix(sudo:session): session closed for user root Dec 13 02:31:12.234000 audit[1486]: USER_END pid=1486 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:31:12.236189 kernel: kauditd_printk_skb: 263 callbacks suppressed Dec 13 02:31:12.236226 kernel: audit: type=1106 audit(1734057072.234:823): pid=1486 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:31:12.235000 audit[1486]: CRED_DISP pid=1486 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:31:12.242178 kernel: audit: type=1104 audit(1734057072.235:824): pid=1486 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:31:12.243101 sshd[1482]: pam_unix(sshd:session): session closed for user core Dec 13 02:31:12.242000 audit[1482]: USER_END pid=1482 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:31:12.244968 systemd-logind[1241]: Session 9 logged out. Waiting for processes to exit. Dec 13 02:31:12.245937 systemd[1]: sshd@6-139.178.70.105:22-147.75.109.163:43888.service: Deactivated successfully. Dec 13 02:31:12.246411 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 02:31:12.246502 systemd[1]: session-9.scope: Consumed 3.021s CPU time. Dec 13 02:31:12.247462 systemd-logind[1241]: Removed session 9. Dec 13 02:31:12.242000 audit[1482]: CRED_DISP pid=1482 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:31:12.250784 kernel: audit: type=1106 audit(1734057072.242:825): pid=1482 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:31:12.250820 kernel: audit: type=1104 audit(1734057072.242:826): pid=1482 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:31:12.250838 kernel: audit: type=1131 audit(1734057072.242:827): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.105:22-147.75.109.163:43888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:31:12.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.105:22-147.75.109.163:43888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:31:12.485398 kubelet[2118]: I1213 02:31:12.485368 2118 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 02:31:12.485854 env[1256]: time="2024-12-13T02:31:12.485773930Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 02:31:12.486096 kubelet[2118]: I1213 02:31:12.486080 2118 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 02:31:13.297442 systemd[1]: Created slice kubepods-besteffort-pod6a04b740_2d59_4fd3_b793_2f21fd93bf0d.slice. Dec 13 02:31:13.376939 kubelet[2118]: I1213 02:31:13.376916 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l7ntc\" (UniqueName: \"kubernetes.io/projected/6a04b740-2d59-4fd3-b793-2f21fd93bf0d-kube-api-access-l7ntc\") pod \"kube-proxy-p6fwd\" (UID: \"6a04b740-2d59-4fd3-b793-2f21fd93bf0d\") " pod="kube-system/kube-proxy-p6fwd" Dec 13 02:31:13.377078 kubelet[2118]: I1213 02:31:13.377066 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/6a04b740-2d59-4fd3-b793-2f21fd93bf0d-kube-proxy\") pod \"kube-proxy-p6fwd\" (UID: \"6a04b740-2d59-4fd3-b793-2f21fd93bf0d\") " pod="kube-system/kube-proxy-p6fwd" Dec 13 02:31:13.377177 kubelet[2118]: I1213 02:31:13.377154 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6a04b740-2d59-4fd3-b793-2f21fd93bf0d-xtables-lock\") pod \"kube-proxy-p6fwd\" (UID: \"6a04b740-2d59-4fd3-b793-2f21fd93bf0d\") " pod="kube-system/kube-proxy-p6fwd" Dec 13 02:31:13.377261 kubelet[2118]: I1213 02:31:13.377250 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6a04b740-2d59-4fd3-b793-2f21fd93bf0d-lib-modules\") pod \"kube-proxy-p6fwd\" (UID: \"6a04b740-2d59-4fd3-b793-2f21fd93bf0d\") " pod="kube-system/kube-proxy-p6fwd" Dec 13 02:31:13.481600 kubelet[2118]: I1213 02:31:13.481582 2118 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 02:31:13.546261 systemd[1]: Created slice kubepods-besteffort-pod641f0a50_8488_46f0_ad66_5cc665e46f65.slice. Dec 13 02:31:13.578740 kubelet[2118]: I1213 02:31:13.578673 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/641f0a50-8488-46f0-ad66-5cc665e46f65-var-lib-calico\") pod \"tigera-operator-76c4976dd7-x48ww\" (UID: \"641f0a50-8488-46f0-ad66-5cc665e46f65\") " pod="tigera-operator/tigera-operator-76c4976dd7-x48ww" Dec 13 02:31:13.578990 kubelet[2118]: I1213 02:31:13.578976 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lnvbx\" (UniqueName: \"kubernetes.io/projected/641f0a50-8488-46f0-ad66-5cc665e46f65-kube-api-access-lnvbx\") pod \"tigera-operator-76c4976dd7-x48ww\" (UID: \"641f0a50-8488-46f0-ad66-5cc665e46f65\") " pod="tigera-operator/tigera-operator-76c4976dd7-x48ww" Dec 13 02:31:13.604359 env[1256]: time="2024-12-13T02:31:13.604332758Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-p6fwd,Uid:6a04b740-2d59-4fd3-b793-2f21fd93bf0d,Namespace:kube-system,Attempt:0,}" Dec 13 02:31:13.619333 env[1256]: time="2024-12-13T02:31:13.619281054Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:31:13.619333 env[1256]: time="2024-12-13T02:31:13.619330410Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:31:13.619451 env[1256]: time="2024-12-13T02:31:13.619349084Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:31:13.619578 env[1256]: time="2024-12-13T02:31:13.619541958Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e22d9cdff47df8680e950b8295808d8f0d517cd1b866821a01ad4de0d221a731 pid=2198 runtime=io.containerd.runc.v2 Dec 13 02:31:13.628148 systemd[1]: Started cri-containerd-e22d9cdff47df8680e950b8295808d8f0d517cd1b866821a01ad4de0d221a731.scope. Dec 13 02:31:13.631366 systemd[1]: run-containerd-runc-k8s.io-e22d9cdff47df8680e950b8295808d8f0d517cd1b866821a01ad4de0d221a731-runc.QwbLQa.mount: Deactivated successfully. Dec 13 02:31:13.645276 kernel: audit: type=1400 audit(1734057073.640:828): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.645333 kernel: audit: type=1400 audit(1734057073.640:829): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.650261 kernel: audit: type=1400 audit(1734057073.640:830): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.650293 kernel: audit: type=1400 audit(1734057073.640:831): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.655306 kernel: audit: type=1400 audit(1734057073.640:832): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.644000 audit: BPF prog-id=103 op=LOAD Dec 13 02:31:13.649000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.649000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2198 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:13.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532326439636466663437646638363830653935306238323935383038 Dec 13 02:31:13.649000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.649000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2198 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:13.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532326439636466663437646638363830653935306238323935383038 Dec 13 02:31:13.649000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.649000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.649000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.649000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.649000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.649000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.649000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.649000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.649000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.649000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.649000 audit: BPF prog-id=104 op=LOAD Dec 13 02:31:13.649000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002030f0 items=0 ppid=2198 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:13.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532326439636466663437646638363830653935306238323935383038 Dec 13 02:31:13.654000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.654000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.654000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.654000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.654000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.654000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.654000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.654000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.654000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.654000 audit: BPF prog-id=105 op=LOAD Dec 13 02:31:13.654000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000203138 items=0 ppid=2198 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:13.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532326439636466663437646638363830653935306238323935383038 Dec 13 02:31:13.655000 audit: BPF prog-id=105 op=UNLOAD Dec 13 02:31:13.655000 audit: BPF prog-id=104 op=UNLOAD Dec 13 02:31:13.655000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.655000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.655000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.655000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.655000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.655000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.655000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.655000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.655000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.655000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.655000 audit: BPF prog-id=106 op=LOAD Dec 13 02:31:13.655000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000203548 items=0 ppid=2198 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:13.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532326439636466663437646638363830653935306238323935383038 Dec 13 02:31:13.665562 env[1256]: time="2024-12-13T02:31:13.665523790Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-p6fwd,Uid:6a04b740-2d59-4fd3-b793-2f21fd93bf0d,Namespace:kube-system,Attempt:0,} returns sandbox id \"e22d9cdff47df8680e950b8295808d8f0d517cd1b866821a01ad4de0d221a731\"" Dec 13 02:31:13.668848 env[1256]: time="2024-12-13T02:31:13.668821820Z" level=info msg="CreateContainer within sandbox \"e22d9cdff47df8680e950b8295808d8f0d517cd1b866821a01ad4de0d221a731\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 02:31:13.709979 env[1256]: time="2024-12-13T02:31:13.709947980Z" level=info msg="CreateContainer within sandbox \"e22d9cdff47df8680e950b8295808d8f0d517cd1b866821a01ad4de0d221a731\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"e427a573a0c2aa4fa978df0c10662490834c9a8e305c16bb9a5d9a9911b8ad88\"" Dec 13 02:31:13.710569 env[1256]: time="2024-12-13T02:31:13.710547300Z" level=info msg="StartContainer for \"e427a573a0c2aa4fa978df0c10662490834c9a8e305c16bb9a5d9a9911b8ad88\"" Dec 13 02:31:13.721637 systemd[1]: Started cri-containerd-e427a573a0c2aa4fa978df0c10662490834c9a8e305c16bb9a5d9a9911b8ad88.scope. Dec 13 02:31:13.730000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.730000 audit[2239]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9f50c260a8 items=0 ppid=2198 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:13.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534323761353733613063326161346661393738646630633130363632 Dec 13 02:31:13.730000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.730000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.730000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.730000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.730000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.730000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.730000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.730000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.730000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.730000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.730000 audit: BPF prog-id=107 op=LOAD Dec 13 02:31:13.730000 audit[2239]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f9dd8 items=0 ppid=2198 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:13.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534323761353733613063326161346661393738646630633130363632 Dec 13 02:31:13.731000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.731000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.731000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.731000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.731000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.731000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.731000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.731000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.731000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.731000 audit: BPF prog-id=108 op=LOAD Dec 13 02:31:13.731000 audit[2239]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f9e28 items=0 ppid=2198 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:13.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534323761353733613063326161346661393738646630633130363632 Dec 13 02:31:13.731000 audit: BPF prog-id=108 op=UNLOAD Dec 13 02:31:13.732000 audit: BPF prog-id=107 op=UNLOAD Dec 13 02:31:13.732000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.732000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.732000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.732000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.732000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.732000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.732000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.732000 audit[2239]: AVC avc: denied { perfmon } for pid=2239 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.732000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.732000 audit[2239]: AVC avc: denied { bpf } for pid=2239 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.732000 audit: BPF prog-id=109 op=LOAD Dec 13 02:31:13.732000 audit[2239]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f9eb8 items=0 ppid=2198 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:13.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534323761353733613063326161346661393738646630633130363632 Dec 13 02:31:13.741442 env[1256]: time="2024-12-13T02:31:13.741412094Z" level=info msg="StartContainer for \"e427a573a0c2aa4fa978df0c10662490834c9a8e305c16bb9a5d9a9911b8ad88\" returns successfully" Dec 13 02:31:13.848574 env[1256]: time="2024-12-13T02:31:13.848505173Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-x48ww,Uid:641f0a50-8488-46f0-ad66-5cc665e46f65,Namespace:tigera-operator,Attempt:0,}" Dec 13 02:31:13.912192 env[1256]: time="2024-12-13T02:31:13.911958377Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:31:13.912192 env[1256]: time="2024-12-13T02:31:13.912026225Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:31:13.912192 env[1256]: time="2024-12-13T02:31:13.912038686Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:31:13.912360 env[1256]: time="2024-12-13T02:31:13.912235070Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/65483bda2b19da8940999b75cc384ad367f2d6ddc28886ef34e18174317e52d0 pid=2271 runtime=io.containerd.runc.v2 Dec 13 02:31:13.925288 systemd[1]: Started cri-containerd-65483bda2b19da8940999b75cc384ad367f2d6ddc28886ef34e18174317e52d0.scope. Dec 13 02:31:13.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit: BPF prog-id=110 op=LOAD Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2271 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:13.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635343833626461326231396461383934303939396237356363333834 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2271 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:13.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635343833626461326231396461383934303939396237356363333834 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit: BPF prog-id=111 op=LOAD Dec 13 02:31:13.938000 audit[2281]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00036a000 items=0 ppid=2271 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:13.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635343833626461326231396461383934303939396237356363333834 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit: BPF prog-id=112 op=LOAD Dec 13 02:31:13.938000 audit[2281]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00036a048 items=0 ppid=2271 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:13.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635343833626461326231396461383934303939396237356363333834 Dec 13 02:31:13.938000 audit: BPF prog-id=112 op=UNLOAD Dec 13 02:31:13.938000 audit: BPF prog-id=111 op=UNLOAD Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:13.938000 audit: BPF prog-id=113 op=LOAD Dec 13 02:31:13.938000 audit[2281]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00036a458 items=0 ppid=2271 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:13.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635343833626461326231396461383934303939396237356363333834 Dec 13 02:31:13.959982 env[1256]: time="2024-12-13T02:31:13.959954484Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-x48ww,Uid:641f0a50-8488-46f0-ad66-5cc665e46f65,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"65483bda2b19da8940999b75cc384ad367f2d6ddc28886ef34e18174317e52d0\"" Dec 13 02:31:13.965928 env[1256]: time="2024-12-13T02:31:13.965905713Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 02:31:14.511045 kubelet[2118]: I1213 02:31:14.511003 2118 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-p6fwd" podStartSLOduration=1.510991958 podStartE2EDuration="1.510991958s" podCreationTimestamp="2024-12-13 02:31:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:31:14.200617969 +0000 UTC m=+6.179720443" watchObservedRunningTime="2024-12-13 02:31:14.510991958 +0000 UTC m=+6.490094427" Dec 13 02:31:14.802000 audit[2341]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:14.802000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2992eb30 a2=0 a3=7ffe2992eb1c items=0 ppid=2250 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.802000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:31:14.802000 audit[2342]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.802000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef1964280 a2=0 a3=7ffef196426c items=0 ppid=2250 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.802000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:31:14.803000 audit[2343]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:14.803000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7918a1f0 a2=0 a3=7ffc7918a1dc items=0 ppid=2250 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.803000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:31:14.803000 audit[2344]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.803000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd94fad3f0 a2=0 a3=7ffd94fad3dc items=0 ppid=2250 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:31:14.804000 audit[2345]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:14.804000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd69fa4610 a2=0 a3=7ffd69fa45fc items=0 ppid=2250 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.804000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:31:14.804000 audit[2346]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.804000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe967b88b0 a2=0 a3=7ffe967b889c items=0 ppid=2250 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.804000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:31:14.929000 audit[2347]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.929000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc93596560 a2=0 a3=7ffc9359654c items=0 ppid=2250 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.929000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:31:14.943000 audit[2349]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.943000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcf4f7be40 a2=0 a3=7ffcf4f7be2c items=0 ppid=2250 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.943000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 02:31:14.953000 audit[2352]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.953000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffde84613f0 a2=0 a3=7ffde84613dc items=0 ppid=2250 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.953000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 02:31:14.954000 audit[2353]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.954000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff11ea9480 a2=0 a3=7fff11ea946c items=0 ppid=2250 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.954000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:31:14.956000 audit[2355]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.956000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd6615a230 a2=0 a3=7ffd6615a21c items=0 ppid=2250 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.956000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:31:14.957000 audit[2356]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.957000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff45875710 a2=0 a3=7fff458756fc items=0 ppid=2250 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.957000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:31:14.958000 audit[2358]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.958000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe67fd57d0 a2=0 a3=7ffe67fd57bc items=0 ppid=2250 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.958000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:31:14.961000 audit[2361]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.961000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffce906e4c0 a2=0 a3=7ffce906e4ac items=0 ppid=2250 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.961000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 02:31:14.962000 audit[2362]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.962000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffe433170 a2=0 a3=7ffffe43315c items=0 ppid=2250 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:31:14.963000 audit[2364]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.963000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc11c894a0 a2=0 a3=7ffc11c8948c items=0 ppid=2250 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.963000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:31:14.964000 audit[2365]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.964000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5bbe5060 a2=0 a3=7ffe5bbe504c items=0 ppid=2250 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.964000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:31:14.966000 audit[2367]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2367 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.966000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff6d9464e0 a2=0 a3=7fff6d9464cc items=0 ppid=2250 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.966000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:31:14.968000 audit[2370]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.968000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc64662510 a2=0 a3=7ffc646624fc items=0 ppid=2250 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.968000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:31:14.971000 audit[2373]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.971000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc5b350240 a2=0 a3=7ffc5b35022c items=0 ppid=2250 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.971000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:31:14.972000 audit[2374]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.972000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd17fb5f70 a2=0 a3=7ffd17fb5f5c items=0 ppid=2250 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:31:14.974000 audit[2376]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.974000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffcf967dd50 a2=0 a3=7ffcf967dd3c items=0 ppid=2250 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.974000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:31:14.976000 audit[2379]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.976000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffebc9f6e40 a2=0 a3=7ffebc9f6e2c items=0 ppid=2250 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.976000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:31:14.977000 audit[2380]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.977000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc884359b0 a2=0 a3=7ffc8843599c items=0 ppid=2250 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.977000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:31:14.979000 audit[2382]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:31:14.979000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffec99ffd30 a2=0 a3=7ffec99ffd1c items=0 ppid=2250 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.979000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:31:14.999000 audit[2388]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:31:14.999000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdaa1459a0 a2=0 a3=7ffdaa14598c items=0 ppid=2250 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:14.999000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:31:15.020000 audit[2388]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:31:15.020000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffdaa1459a0 a2=0 a3=7ffdaa14598c items=0 ppid=2250 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.020000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:31:15.021000 audit[2393]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.021000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffbbe53280 a2=0 a3=7fffbbe5326c items=0 ppid=2250 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.021000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:31:15.023000 audit[2395]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.023000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe6fdc4900 a2=0 a3=7ffe6fdc48ec items=0 ppid=2250 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.023000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 02:31:15.026000 audit[2398]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2398 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.026000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff36c66170 a2=0 a3=7fff36c6615c items=0 ppid=2250 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.026000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 02:31:15.027000 audit[2399]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.027000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff36a579f0 a2=0 a3=7fff36a579dc items=0 ppid=2250 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.027000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:31:15.028000 audit[2401]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2401 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.028000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff3b1edf70 a2=0 a3=7fff3b1edf5c items=0 ppid=2250 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.028000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:31:15.029000 audit[2402]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.029000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc8394d70 a2=0 a3=7ffdc8394d5c items=0 ppid=2250 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.029000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:31:15.031000 audit[2404]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2404 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.031000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe737e5d30 a2=0 a3=7ffe737e5d1c items=0 ppid=2250 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.031000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 02:31:15.033000 audit[2407]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.033000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc09151dd0 a2=0 a3=7ffc09151dbc items=0 ppid=2250 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.033000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:31:15.034000 audit[2408]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.034000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdeb711740 a2=0 a3=7ffdeb71172c items=0 ppid=2250 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.034000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:31:15.035000 audit[2410]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2410 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.035000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffab203e80 a2=0 a3=7fffab203e6c items=0 ppid=2250 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.035000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:31:15.036000 audit[2411]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2411 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.036000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe08908ef0 a2=0 a3=7ffe08908edc items=0 ppid=2250 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.036000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:31:15.037000 audit[2413]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2413 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.037000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef4c54580 a2=0 a3=7ffef4c5456c items=0 ppid=2250 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.037000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:31:15.039000 audit[2416]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2416 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.039000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcefc4b850 a2=0 a3=7ffcefc4b83c items=0 ppid=2250 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.039000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:31:15.041000 audit[2419]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.041000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffa8f370b0 a2=0 a3=7fffa8f3709c items=0 ppid=2250 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.041000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 02:31:15.042000 audit[2420]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2420 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.042000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffea93e65f0 a2=0 a3=7ffea93e65dc items=0 ppid=2250 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.042000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:31:15.043000 audit[2422]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2422 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.043000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd17cee0a0 a2=0 a3=7ffd17cee08c items=0 ppid=2250 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.043000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:31:15.046000 audit[2425]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2425 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.046000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffee1d5540 a2=0 a3=7fffee1d552c items=0 ppid=2250 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.046000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:31:15.046000 audit[2426]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2426 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.046000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcd1ea910 a2=0 a3=7fffcd1ea8fc items=0 ppid=2250 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.046000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:31:15.048000 audit[2428]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2428 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.048000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd6efb1c40 a2=0 a3=7ffd6efb1c2c items=0 ppid=2250 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.048000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:31:15.048000 audit[2429]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2429 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.048000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1614b260 a2=0 a3=7ffc1614b24c items=0 ppid=2250 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.048000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:31:15.050000 audit[2431]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2431 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.050000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc41a4d950 a2=0 a3=7ffc41a4d93c items=0 ppid=2250 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.050000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:31:15.052000 audit[2434]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:31:15.052000 audit[2434]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd179df7b0 a2=0 a3=7ffd179df79c items=0 ppid=2250 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.052000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:31:15.054000 audit[2436]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2436 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:31:15.054000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffd5176cc60 a2=0 a3=7ffd5176cc4c items=0 ppid=2250 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.054000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:31:15.054000 audit[2436]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:31:15.054000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd5176cc60 a2=0 a3=7ffd5176cc4c items=0 ppid=2250 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:15.054000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:31:16.651216 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1639022541.mount: Deactivated successfully. Dec 13 02:31:18.066696 env[1256]: time="2024-12-13T02:31:18.066667510Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:18.067934 env[1256]: time="2024-12-13T02:31:18.067920003Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:18.069019 env[1256]: time="2024-12-13T02:31:18.069007101Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:18.069794 env[1256]: time="2024-12-13T02:31:18.069776076Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:18.070431 env[1256]: time="2024-12-13T02:31:18.070395165Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 02:31:18.079642 env[1256]: time="2024-12-13T02:31:18.079618060Z" level=info msg="CreateContainer within sandbox \"65483bda2b19da8940999b75cc384ad367f2d6ddc28886ef34e18174317e52d0\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 02:31:18.085878 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2565435077.mount: Deactivated successfully. Dec 13 02:31:18.089178 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2236811065.mount: Deactivated successfully. Dec 13 02:31:18.108560 env[1256]: time="2024-12-13T02:31:18.108527326Z" level=info msg="CreateContainer within sandbox \"65483bda2b19da8940999b75cc384ad367f2d6ddc28886ef34e18174317e52d0\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"469ef3fa1ff143f7b03f7ffd36c96cbd6df7b8b0e337caf6403e7e8c0cb30e3f\"" Dec 13 02:31:18.109037 env[1256]: time="2024-12-13T02:31:18.109023304Z" level=info msg="StartContainer for \"469ef3fa1ff143f7b03f7ffd36c96cbd6df7b8b0e337caf6403e7e8c0cb30e3f\"" Dec 13 02:31:18.125490 systemd[1]: Started cri-containerd-469ef3fa1ff143f7b03f7ffd36c96cbd6df7b8b0e337caf6403e7e8c0cb30e3f.scope. Dec 13 02:31:18.138211 kernel: kauditd_printk_skb: 305 callbacks suppressed Dec 13 02:31:18.138281 kernel: audit: type=1400 audit(1734057078.134:921): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140745 kernel: audit: type=1400 audit(1734057078.134:922): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.146344 kernel: audit: type=1400 audit(1734057078.134:923): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.146383 kernel: audit: type=1400 audit(1734057078.134:924): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.146401 kernel: audit: type=1400 audit(1734057078.134:925): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.151258 kernel: audit: type=1400 audit(1734057078.134:926): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.154011 kernel: audit: type=1400 audit(1734057078.134:927): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.159610 kernel: audit: type=1400 audit(1734057078.134:928): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.159671 kernel: audit: type=1400 audit(1734057078.134:929): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.162498 kernel: audit: type=1400 audit(1734057078.137:930): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.137000 audit: BPF prog-id=114 op=LOAD Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2271 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:18.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436396566336661316666313433663762303366376666643336633936 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2271 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:18.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436396566336661316666313433663762303366376666643336633936 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit: BPF prog-id=115 op=LOAD Dec 13 02:31:18.140000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00026deb0 items=0 ppid=2271 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:18.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436396566336661316666313433663762303366376666643336633936 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit: BPF prog-id=116 op=LOAD Dec 13 02:31:18.140000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00026def8 items=0 ppid=2271 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:18.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436396566336661316666313433663762303366376666643336633936 Dec 13 02:31:18.140000 audit: BPF prog-id=116 op=UNLOAD Dec 13 02:31:18.140000 audit: BPF prog-id=115 op=UNLOAD Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:18.140000 audit: BPF prog-id=117 op=LOAD Dec 13 02:31:18.140000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b8308 items=0 ppid=2271 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:18.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436396566336661316666313433663762303366376666643336633936 Dec 13 02:31:18.181158 env[1256]: time="2024-12-13T02:31:18.181132858Z" level=info msg="StartContainer for \"469ef3fa1ff143f7b03f7ffd36c96cbd6df7b8b0e337caf6403e7e8c0cb30e3f\" returns successfully" Dec 13 02:31:21.004000 audit[2478]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:31:21.004000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff6d6f0610 a2=0 a3=7fff6d6f05fc items=0 ppid=2250 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:21.004000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:31:21.009000 audit[2478]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:31:21.009000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff6d6f0610 a2=0 a3=0 items=0 ppid=2250 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:21.009000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:31:21.015000 audit[2480]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2480 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:31:21.015000 audit[2480]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffc2dbc860 a2=0 a3=7fffc2dbc84c items=0 ppid=2250 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:21.015000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:31:21.019000 audit[2480]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2480 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:31:21.019000 audit[2480]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffc2dbc860 a2=0 a3=0 items=0 ppid=2250 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:21.019000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:31:21.246961 kubelet[2118]: I1213 02:31:21.246919 2118 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4976dd7-x48ww" podStartSLOduration=4.136354238 podStartE2EDuration="8.24690867s" podCreationTimestamp="2024-12-13 02:31:13 +0000 UTC" firstStartedPulling="2024-12-13 02:31:13.960721294 +0000 UTC m=+5.939823758" lastFinishedPulling="2024-12-13 02:31:18.071275724 +0000 UTC m=+10.050378190" observedRunningTime="2024-12-13 02:31:18.216284069 +0000 UTC m=+10.195386545" watchObservedRunningTime="2024-12-13 02:31:21.24690867 +0000 UTC m=+13.226011140" Dec 13 02:31:21.284193 systemd[1]: Created slice kubepods-besteffort-pod3f747373_97b8_488b_af77_577fbc617c27.slice. Dec 13 02:31:21.322733 systemd[1]: Created slice kubepods-besteffort-podd6c7e93e_a9ab_40ed_a3a2_6d88d4af24aa.slice. Dec 13 02:31:21.326244 kubelet[2118]: I1213 02:31:21.326221 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8trc8\" (UniqueName: \"kubernetes.io/projected/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-kube-api-access-8trc8\") pod \"calico-node-8rmwh\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " pod="calico-system/calico-node-8rmwh" Dec 13 02:31:21.326398 kubelet[2118]: I1213 02:31:21.326385 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-lib-modules\") pod \"calico-node-8rmwh\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " pod="calico-system/calico-node-8rmwh" Dec 13 02:31:21.326493 kubelet[2118]: I1213 02:31:21.326481 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-var-run-calico\") pod \"calico-node-8rmwh\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " pod="calico-system/calico-node-8rmwh" Dec 13 02:31:21.326584 kubelet[2118]: I1213 02:31:21.326572 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-var-lib-calico\") pod \"calico-node-8rmwh\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " pod="calico-system/calico-node-8rmwh" Dec 13 02:31:21.326683 kubelet[2118]: I1213 02:31:21.326661 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-cni-bin-dir\") pod \"calico-node-8rmwh\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " pod="calico-system/calico-node-8rmwh" Dec 13 02:31:21.326741 kubelet[2118]: I1213 02:31:21.326687 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5c6t9\" (UniqueName: \"kubernetes.io/projected/3f747373-97b8-488b-af77-577fbc617c27-kube-api-access-5c6t9\") pod \"calico-typha-77dffb9d59-x6qcd\" (UID: \"3f747373-97b8-488b-af77-577fbc617c27\") " pod="calico-system/calico-typha-77dffb9d59-x6qcd" Dec 13 02:31:21.326741 kubelet[2118]: I1213 02:31:21.326709 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/3f747373-97b8-488b-af77-577fbc617c27-typha-certs\") pod \"calico-typha-77dffb9d59-x6qcd\" (UID: \"3f747373-97b8-488b-af77-577fbc617c27\") " pod="calico-system/calico-typha-77dffb9d59-x6qcd" Dec 13 02:31:21.326741 kubelet[2118]: I1213 02:31:21.326721 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-tigera-ca-bundle\") pod \"calico-node-8rmwh\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " pod="calico-system/calico-node-8rmwh" Dec 13 02:31:21.326741 kubelet[2118]: I1213 02:31:21.326730 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-node-certs\") pod \"calico-node-8rmwh\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " pod="calico-system/calico-node-8rmwh" Dec 13 02:31:21.326741 kubelet[2118]: I1213 02:31:21.326739 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-cni-log-dir\") pod \"calico-node-8rmwh\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " pod="calico-system/calico-node-8rmwh" Dec 13 02:31:21.326897 kubelet[2118]: I1213 02:31:21.326749 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-xtables-lock\") pod \"calico-node-8rmwh\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " pod="calico-system/calico-node-8rmwh" Dec 13 02:31:21.326897 kubelet[2118]: I1213 02:31:21.326758 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-cni-net-dir\") pod \"calico-node-8rmwh\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " pod="calico-system/calico-node-8rmwh" Dec 13 02:31:21.326897 kubelet[2118]: I1213 02:31:21.326767 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-flexvol-driver-host\") pod \"calico-node-8rmwh\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " pod="calico-system/calico-node-8rmwh" Dec 13 02:31:21.326897 kubelet[2118]: I1213 02:31:21.326775 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3f747373-97b8-488b-af77-577fbc617c27-tigera-ca-bundle\") pod \"calico-typha-77dffb9d59-x6qcd\" (UID: \"3f747373-97b8-488b-af77-577fbc617c27\") " pod="calico-system/calico-typha-77dffb9d59-x6qcd" Dec 13 02:31:21.326897 kubelet[2118]: I1213 02:31:21.326788 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-policysync\") pod \"calico-node-8rmwh\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " pod="calico-system/calico-node-8rmwh" Dec 13 02:31:21.440643 kubelet[2118]: E1213 02:31:21.440612 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7z7tl" podUID="47c64936-f63c-409a-acf6-791447c02a65" Dec 13 02:31:21.441240 kubelet[2118]: E1213 02:31:21.441225 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.441240 kubelet[2118]: W1213 02:31:21.441235 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.441321 kubelet[2118]: E1213 02:31:21.441248 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.446603 kubelet[2118]: E1213 02:31:21.446580 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.446603 kubelet[2118]: W1213 02:31:21.446597 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.446713 kubelet[2118]: E1213 02:31:21.446609 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.454378 kubelet[2118]: E1213 02:31:21.454361 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.454378 kubelet[2118]: W1213 02:31:21.454373 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.454489 kubelet[2118]: E1213 02:31:21.454385 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.525183 kubelet[2118]: E1213 02:31:21.525138 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.525183 kubelet[2118]: W1213 02:31:21.525155 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.525183 kubelet[2118]: E1213 02:31:21.525183 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.525338 kubelet[2118]: E1213 02:31:21.525311 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.525338 kubelet[2118]: W1213 02:31:21.525316 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.525338 kubelet[2118]: E1213 02:31:21.525322 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.525506 kubelet[2118]: E1213 02:31:21.525496 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.525506 kubelet[2118]: W1213 02:31:21.525503 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.525568 kubelet[2118]: E1213 02:31:21.525509 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.525607 kubelet[2118]: E1213 02:31:21.525596 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.525607 kubelet[2118]: W1213 02:31:21.525603 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.525667 kubelet[2118]: E1213 02:31:21.525608 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.525786 kubelet[2118]: E1213 02:31:21.525775 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.525786 kubelet[2118]: W1213 02:31:21.525783 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.525863 kubelet[2118]: E1213 02:31:21.525791 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.525888 kubelet[2118]: E1213 02:31:21.525882 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.525888 kubelet[2118]: W1213 02:31:21.525886 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.525927 kubelet[2118]: E1213 02:31:21.525891 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.525978 kubelet[2118]: E1213 02:31:21.525966 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.525978 kubelet[2118]: W1213 02:31:21.525974 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.526047 kubelet[2118]: E1213 02:31:21.525983 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.526073 kubelet[2118]: E1213 02:31:21.526060 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.526073 kubelet[2118]: W1213 02:31:21.526064 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.526073 kubelet[2118]: E1213 02:31:21.526069 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.526174 kubelet[2118]: E1213 02:31:21.526158 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.526219 kubelet[2118]: W1213 02:31:21.526183 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.526219 kubelet[2118]: E1213 02:31:21.526192 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.526276 kubelet[2118]: E1213 02:31:21.526267 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.526276 kubelet[2118]: W1213 02:31:21.526273 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.526343 kubelet[2118]: E1213 02:31:21.526277 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.526378 kubelet[2118]: E1213 02:31:21.526346 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.526378 kubelet[2118]: W1213 02:31:21.526350 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.526378 kubelet[2118]: E1213 02:31:21.526355 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.526447 kubelet[2118]: E1213 02:31:21.526437 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.526447 kubelet[2118]: W1213 02:31:21.526443 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.526504 kubelet[2118]: E1213 02:31:21.526448 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.526616 kubelet[2118]: E1213 02:31:21.526606 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.526616 kubelet[2118]: W1213 02:31:21.526612 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.526695 kubelet[2118]: E1213 02:31:21.526618 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.526738 kubelet[2118]: E1213 02:31:21.526727 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.526738 kubelet[2118]: W1213 02:31:21.526734 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.526816 kubelet[2118]: E1213 02:31:21.526739 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.526816 kubelet[2118]: E1213 02:31:21.526808 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.526816 kubelet[2118]: W1213 02:31:21.526812 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.526880 kubelet[2118]: E1213 02:31:21.526818 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.526904 kubelet[2118]: E1213 02:31:21.526887 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.526904 kubelet[2118]: W1213 02:31:21.526892 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.526904 kubelet[2118]: E1213 02:31:21.526896 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.526982 kubelet[2118]: E1213 02:31:21.526973 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.526982 kubelet[2118]: W1213 02:31:21.526977 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.526982 kubelet[2118]: E1213 02:31:21.526981 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.527063 kubelet[2118]: E1213 02:31:21.527052 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.527063 kubelet[2118]: W1213 02:31:21.527058 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.527063 kubelet[2118]: E1213 02:31:21.527063 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.527157 kubelet[2118]: E1213 02:31:21.527141 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.527157 kubelet[2118]: W1213 02:31:21.527146 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.527157 kubelet[2118]: E1213 02:31:21.527150 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.527245 kubelet[2118]: E1213 02:31:21.527237 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.527245 kubelet[2118]: W1213 02:31:21.527241 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.527342 kubelet[2118]: E1213 02:31:21.527246 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.528180 kubelet[2118]: E1213 02:31:21.527395 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.528180 kubelet[2118]: W1213 02:31:21.527401 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.528180 kubelet[2118]: E1213 02:31:21.527406 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.528180 kubelet[2118]: I1213 02:31:21.527420 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/47c64936-f63c-409a-acf6-791447c02a65-kubelet-dir\") pod \"csi-node-driver-7z7tl\" (UID: \"47c64936-f63c-409a-acf6-791447c02a65\") " pod="calico-system/csi-node-driver-7z7tl" Dec 13 02:31:21.528180 kubelet[2118]: E1213 02:31:21.527524 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.528180 kubelet[2118]: W1213 02:31:21.527532 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.528180 kubelet[2118]: E1213 02:31:21.527539 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.528180 kubelet[2118]: I1213 02:31:21.527552 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/47c64936-f63c-409a-acf6-791447c02a65-socket-dir\") pod \"csi-node-driver-7z7tl\" (UID: \"47c64936-f63c-409a-acf6-791447c02a65\") " pod="calico-system/csi-node-driver-7z7tl" Dec 13 02:31:21.528180 kubelet[2118]: E1213 02:31:21.527647 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.528688 kubelet[2118]: W1213 02:31:21.527658 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.528688 kubelet[2118]: E1213 02:31:21.527663 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.528688 kubelet[2118]: I1213 02:31:21.527671 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/47c64936-f63c-409a-acf6-791447c02a65-registration-dir\") pod \"csi-node-driver-7z7tl\" (UID: \"47c64936-f63c-409a-acf6-791447c02a65\") " pod="calico-system/csi-node-driver-7z7tl" Dec 13 02:31:21.528688 kubelet[2118]: E1213 02:31:21.527761 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.528688 kubelet[2118]: W1213 02:31:21.527766 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.528688 kubelet[2118]: E1213 02:31:21.527780 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.528688 kubelet[2118]: I1213 02:31:21.527792 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/47c64936-f63c-409a-acf6-791447c02a65-varrun\") pod \"csi-node-driver-7z7tl\" (UID: \"47c64936-f63c-409a-acf6-791447c02a65\") " pod="calico-system/csi-node-driver-7z7tl" Dec 13 02:31:21.528688 kubelet[2118]: E1213 02:31:21.527935 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.528868 kubelet[2118]: W1213 02:31:21.527943 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.528868 kubelet[2118]: E1213 02:31:21.527954 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.528868 kubelet[2118]: I1213 02:31:21.527980 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vsjfn\" (UniqueName: \"kubernetes.io/projected/47c64936-f63c-409a-acf6-791447c02a65-kube-api-access-vsjfn\") pod \"csi-node-driver-7z7tl\" (UID: \"47c64936-f63c-409a-acf6-791447c02a65\") " pod="calico-system/csi-node-driver-7z7tl" Dec 13 02:31:21.528868 kubelet[2118]: E1213 02:31:21.528133 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.528868 kubelet[2118]: W1213 02:31:21.528144 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.528868 kubelet[2118]: E1213 02:31:21.528156 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.528868 kubelet[2118]: E1213 02:31:21.528259 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.528868 kubelet[2118]: W1213 02:31:21.528263 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.528868 kubelet[2118]: E1213 02:31:21.528275 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.529049 kubelet[2118]: E1213 02:31:21.528362 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.529049 kubelet[2118]: W1213 02:31:21.528368 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.529049 kubelet[2118]: E1213 02:31:21.528379 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.529049 kubelet[2118]: E1213 02:31:21.528459 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.529049 kubelet[2118]: W1213 02:31:21.528463 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.529049 kubelet[2118]: E1213 02:31:21.528475 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.529049 kubelet[2118]: E1213 02:31:21.528573 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.529049 kubelet[2118]: W1213 02:31:21.528578 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.529049 kubelet[2118]: E1213 02:31:21.528587 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.529049 kubelet[2118]: E1213 02:31:21.528660 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.529286 kubelet[2118]: W1213 02:31:21.528665 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.529286 kubelet[2118]: E1213 02:31:21.528672 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.529286 kubelet[2118]: E1213 02:31:21.528747 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.529286 kubelet[2118]: W1213 02:31:21.528752 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.529286 kubelet[2118]: E1213 02:31:21.528759 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.529286 kubelet[2118]: E1213 02:31:21.528835 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.529286 kubelet[2118]: W1213 02:31:21.528840 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.529286 kubelet[2118]: E1213 02:31:21.528844 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.529286 kubelet[2118]: E1213 02:31:21.528929 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.529286 kubelet[2118]: W1213 02:31:21.528936 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.529531 kubelet[2118]: E1213 02:31:21.528941 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.529531 kubelet[2118]: E1213 02:31:21.529011 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.529531 kubelet[2118]: W1213 02:31:21.529016 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.529531 kubelet[2118]: E1213 02:31:21.529024 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.599427 env[1256]: time="2024-12-13T02:31:21.599338552Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-77dffb9d59-x6qcd,Uid:3f747373-97b8-488b-af77-577fbc617c27,Namespace:calico-system,Attempt:0,}" Dec 13 02:31:21.628826 env[1256]: time="2024-12-13T02:31:21.628797495Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8rmwh,Uid:d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa,Namespace:calico-system,Attempt:0,}" Dec 13 02:31:21.629689 kubelet[2118]: E1213 02:31:21.629441 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.629689 kubelet[2118]: W1213 02:31:21.629457 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.629689 kubelet[2118]: E1213 02:31:21.629487 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.629935 kubelet[2118]: E1213 02:31:21.629928 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.630027 kubelet[2118]: W1213 02:31:21.630017 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.630096 kubelet[2118]: E1213 02:31:21.630086 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.630795 kubelet[2118]: E1213 02:31:21.630786 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.630891 kubelet[2118]: W1213 02:31:21.630876 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.631320 kubelet[2118]: E1213 02:31:21.631307 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.631890 kubelet[2118]: E1213 02:31:21.631883 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.631955 kubelet[2118]: W1213 02:31:21.631946 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.632034 kubelet[2118]: E1213 02:31:21.632023 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.633044 kubelet[2118]: E1213 02:31:21.633036 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.635154 kubelet[2118]: W1213 02:31:21.633150 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.635154 kubelet[2118]: E1213 02:31:21.633176 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.635154 kubelet[2118]: E1213 02:31:21.633311 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.635154 kubelet[2118]: W1213 02:31:21.633320 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.635154 kubelet[2118]: E1213 02:31:21.633335 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.635154 kubelet[2118]: E1213 02:31:21.633442 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.635154 kubelet[2118]: W1213 02:31:21.633464 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.635154 kubelet[2118]: E1213 02:31:21.633485 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.635154 kubelet[2118]: E1213 02:31:21.633579 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.635154 kubelet[2118]: W1213 02:31:21.633585 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.635437 kubelet[2118]: E1213 02:31:21.633639 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.635437 kubelet[2118]: E1213 02:31:21.633710 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.635437 kubelet[2118]: W1213 02:31:21.633716 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.635437 kubelet[2118]: E1213 02:31:21.633819 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.635437 kubelet[2118]: W1213 02:31:21.633823 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.635437 kubelet[2118]: E1213 02:31:21.633829 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.635437 kubelet[2118]: E1213 02:31:21.633902 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.635437 kubelet[2118]: W1213 02:31:21.633906 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.635437 kubelet[2118]: E1213 02:31:21.633911 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.635437 kubelet[2118]: E1213 02:31:21.634147 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.635708 kubelet[2118]: E1213 02:31:21.634283 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.635708 kubelet[2118]: W1213 02:31:21.634291 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.635708 kubelet[2118]: E1213 02:31:21.634304 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.635708 kubelet[2118]: E1213 02:31:21.634398 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.635708 kubelet[2118]: W1213 02:31:21.634405 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.635708 kubelet[2118]: E1213 02:31:21.634411 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.635708 kubelet[2118]: E1213 02:31:21.634540 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.635708 kubelet[2118]: W1213 02:31:21.634544 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.635708 kubelet[2118]: E1213 02:31:21.634550 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.635708 kubelet[2118]: E1213 02:31:21.634668 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.635924 kubelet[2118]: W1213 02:31:21.634673 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.635924 kubelet[2118]: E1213 02:31:21.634679 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.635924 kubelet[2118]: E1213 02:31:21.634795 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.635924 kubelet[2118]: W1213 02:31:21.634802 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.635924 kubelet[2118]: E1213 02:31:21.634818 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.635924 kubelet[2118]: E1213 02:31:21.634951 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.635924 kubelet[2118]: W1213 02:31:21.634958 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.635924 kubelet[2118]: E1213 02:31:21.634971 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.635924 kubelet[2118]: E1213 02:31:21.635066 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.635924 kubelet[2118]: W1213 02:31:21.635071 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.636210 kubelet[2118]: E1213 02:31:21.635076 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.636354 kubelet[2118]: E1213 02:31:21.636347 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.636414 kubelet[2118]: W1213 02:31:21.636405 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.636482 kubelet[2118]: E1213 02:31:21.636473 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.636662 kubelet[2118]: E1213 02:31:21.636654 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.636738 kubelet[2118]: W1213 02:31:21.636729 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.636810 kubelet[2118]: E1213 02:31:21.636799 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.636978 kubelet[2118]: E1213 02:31:21.636965 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.636978 kubelet[2118]: W1213 02:31:21.636976 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.637045 kubelet[2118]: E1213 02:31:21.636985 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.637099 kubelet[2118]: E1213 02:31:21.637088 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.637099 kubelet[2118]: W1213 02:31:21.637096 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.637157 kubelet[2118]: E1213 02:31:21.637102 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.637218 kubelet[2118]: E1213 02:31:21.637191 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.637218 kubelet[2118]: W1213 02:31:21.637197 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.637218 kubelet[2118]: E1213 02:31:21.637202 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.637306 kubelet[2118]: E1213 02:31:21.637288 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.637306 kubelet[2118]: W1213 02:31:21.637292 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.637306 kubelet[2118]: E1213 02:31:21.637298 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.637391 kubelet[2118]: E1213 02:31:21.637381 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.637391 kubelet[2118]: W1213 02:31:21.637386 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.637391 kubelet[2118]: E1213 02:31:21.637391 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.643455 kubelet[2118]: E1213 02:31:21.643440 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:21.643556 kubelet[2118]: W1213 02:31:21.643545 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:21.643623 kubelet[2118]: E1213 02:31:21.643611 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:21.648780 env[1256]: time="2024-12-13T02:31:21.632807205Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:31:21.648780 env[1256]: time="2024-12-13T02:31:21.632866361Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:31:21.648780 env[1256]: time="2024-12-13T02:31:21.632876935Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:31:21.648780 env[1256]: time="2024-12-13T02:31:21.633102629Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e185bb17410685b672f5aec7ce118f8a87003eada908de6d593b8453fa83435f pid=2534 runtime=io.containerd.runc.v2 Dec 13 02:31:21.659903 systemd[1]: Started cri-containerd-e185bb17410685b672f5aec7ce118f8a87003eada908de6d593b8453fa83435f.scope. Dec 13 02:31:21.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.672000 audit: BPF prog-id=118 op=LOAD Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2534 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:21.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383562623137343130363835623637326635616563376365313138 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2534 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:21.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383562623137343130363835623637326635616563376365313138 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit: BPF prog-id=119 op=LOAD Dec 13 02:31:21.673000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001c9940 items=0 ppid=2534 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:21.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383562623137343130363835623637326635616563376365313138 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit: BPF prog-id=120 op=LOAD Dec 13 02:31:21.673000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001c9988 items=0 ppid=2534 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:21.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383562623137343130363835623637326635616563376365313138 Dec 13 02:31:21.673000 audit: BPF prog-id=120 op=UNLOAD Dec 13 02:31:21.673000 audit: BPF prog-id=119 op=UNLOAD Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.673000 audit: BPF prog-id=121 op=LOAD Dec 13 02:31:21.673000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001c9d98 items=0 ppid=2534 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:21.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383562623137343130363835623637326635616563376365313138 Dec 13 02:31:21.686034 env[1256]: time="2024-12-13T02:31:21.675619477Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:31:21.686034 env[1256]: time="2024-12-13T02:31:21.675673775Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:31:21.686034 env[1256]: time="2024-12-13T02:31:21.675691782Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:31:21.686034 env[1256]: time="2024-12-13T02:31:21.675780975Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1 pid=2592 runtime=io.containerd.runc.v2 Dec 13 02:31:21.692081 systemd[1]: Started cri-containerd-77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1.scope. Dec 13 02:31:21.704977 env[1256]: time="2024-12-13T02:31:21.704951606Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-77dffb9d59-x6qcd,Uid:3f747373-97b8-488b-af77-577fbc617c27,Namespace:calico-system,Attempt:0,} returns sandbox id \"e185bb17410685b672f5aec7ce118f8a87003eada908de6d593b8453fa83435f\"" Dec 13 02:31:21.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.704000 audit: BPF prog-id=122 op=LOAD Dec 13 02:31:21.706000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.706000 audit[2604]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2592 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:21.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737626435623561646534663337633434363432313038303432633836 Dec 13 02:31:21.706000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.706000 audit[2604]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2592 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:21.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737626435623561646534663337633434363432313038303432633836 Dec 13 02:31:21.706000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.706000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.706000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.706000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.706000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.706000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.706000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.706000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.706000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.706000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.706000 audit: BPF prog-id=123 op=LOAD Dec 13 02:31:21.706000 audit[2604]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000236f90 items=0 ppid=2592 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:21.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737626435623561646534663337633434363432313038303432633836 Dec 13 02:31:21.707000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.707000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.707000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.707000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.707000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.707000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.707000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.707000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.707000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.707000 audit: BPF prog-id=124 op=LOAD Dec 13 02:31:21.707000 audit[2604]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000236fd8 items=0 ppid=2592 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:21.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737626435623561646534663337633434363432313038303432633836 Dec 13 02:31:21.707000 audit: BPF prog-id=124 op=UNLOAD Dec 13 02:31:21.707000 audit: BPF prog-id=123 op=UNLOAD Dec 13 02:31:21.707000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.707000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.707000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.707000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.707000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.707000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.707000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.707000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.707000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.707000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:21.707000 audit: BPF prog-id=125 op=LOAD Dec 13 02:31:21.707000 audit[2604]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002373e8 items=0 ppid=2592 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:21.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737626435623561646534663337633434363432313038303432633836 Dec 13 02:31:21.723949 env[1256]: time="2024-12-13T02:31:21.723914933Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8rmwh,Uid:d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa,Namespace:calico-system,Attempt:0,} returns sandbox id \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\"" Dec 13 02:31:21.728138 env[1256]: time="2024-12-13T02:31:21.728115378Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 02:31:22.027000 audit[2633]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2633 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:31:22.027000 audit[2633]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffea175ac40 a2=0 a3=7ffea175ac2c items=0 ppid=2250 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:22.027000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:31:22.031000 audit[2633]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2633 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:31:22.031000 audit[2633]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffea175ac40 a2=0 a3=0 items=0 ppid=2250 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:22.031000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:31:22.234627 kubelet[2118]: E1213 02:31:22.234603 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.234627 kubelet[2118]: W1213 02:31:22.234620 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.234817 kubelet[2118]: E1213 02:31:22.234633 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.234817 kubelet[2118]: E1213 02:31:22.234743 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.234817 kubelet[2118]: W1213 02:31:22.234749 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.234817 kubelet[2118]: E1213 02:31:22.234755 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.234894 kubelet[2118]: E1213 02:31:22.234835 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.234894 kubelet[2118]: W1213 02:31:22.234839 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.234894 kubelet[2118]: E1213 02:31:22.234844 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.234952 kubelet[2118]: E1213 02:31:22.234925 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.234952 kubelet[2118]: W1213 02:31:22.234930 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.234952 kubelet[2118]: E1213 02:31:22.234934 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.235033 kubelet[2118]: E1213 02:31:22.235021 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.235033 kubelet[2118]: W1213 02:31:22.235029 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.235081 kubelet[2118]: E1213 02:31:22.235034 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.235119 kubelet[2118]: E1213 02:31:22.235109 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.235119 kubelet[2118]: W1213 02:31:22.235117 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.235182 kubelet[2118]: E1213 02:31:22.235121 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.235212 kubelet[2118]: E1213 02:31:22.235204 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.235212 kubelet[2118]: W1213 02:31:22.235208 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.235253 kubelet[2118]: E1213 02:31:22.235212 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.235302 kubelet[2118]: E1213 02:31:22.235291 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.235302 kubelet[2118]: W1213 02:31:22.235300 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.235348 kubelet[2118]: E1213 02:31:22.235306 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.235396 kubelet[2118]: E1213 02:31:22.235386 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.235396 kubelet[2118]: W1213 02:31:22.235394 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.235446 kubelet[2118]: E1213 02:31:22.235398 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.235483 kubelet[2118]: E1213 02:31:22.235473 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.235483 kubelet[2118]: W1213 02:31:22.235481 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.235524 kubelet[2118]: E1213 02:31:22.235485 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.235567 kubelet[2118]: E1213 02:31:22.235557 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.235567 kubelet[2118]: W1213 02:31:22.235565 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.235614 kubelet[2118]: E1213 02:31:22.235571 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.235658 kubelet[2118]: E1213 02:31:22.235647 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.235658 kubelet[2118]: W1213 02:31:22.235654 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.235702 kubelet[2118]: E1213 02:31:22.235659 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.235749 kubelet[2118]: E1213 02:31:22.235740 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.235749 kubelet[2118]: W1213 02:31:22.235747 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.235791 kubelet[2118]: E1213 02:31:22.235753 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.235835 kubelet[2118]: E1213 02:31:22.235825 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.235835 kubelet[2118]: W1213 02:31:22.235833 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.235878 kubelet[2118]: E1213 02:31:22.235837 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.235919 kubelet[2118]: E1213 02:31:22.235910 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.235919 kubelet[2118]: W1213 02:31:22.235917 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.235963 kubelet[2118]: E1213 02:31:22.235922 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.236007 kubelet[2118]: E1213 02:31:22.235997 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.236007 kubelet[2118]: W1213 02:31:22.236006 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.236059 kubelet[2118]: E1213 02:31:22.236013 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.236103 kubelet[2118]: E1213 02:31:22.236092 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.236103 kubelet[2118]: W1213 02:31:22.236100 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.238895 kubelet[2118]: E1213 02:31:22.236105 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.238895 kubelet[2118]: E1213 02:31:22.236192 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.238895 kubelet[2118]: W1213 02:31:22.236196 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.238895 kubelet[2118]: E1213 02:31:22.236200 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.238895 kubelet[2118]: E1213 02:31:22.236276 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.238895 kubelet[2118]: W1213 02:31:22.236280 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.238895 kubelet[2118]: E1213 02:31:22.236284 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.238895 kubelet[2118]: E1213 02:31:22.236373 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.238895 kubelet[2118]: W1213 02:31:22.236377 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.238895 kubelet[2118]: E1213 02:31:22.236383 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.239131 kubelet[2118]: E1213 02:31:22.236475 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.239131 kubelet[2118]: W1213 02:31:22.236479 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.239131 kubelet[2118]: E1213 02:31:22.236483 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.239131 kubelet[2118]: E1213 02:31:22.236572 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.239131 kubelet[2118]: W1213 02:31:22.236576 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.239131 kubelet[2118]: E1213 02:31:22.236587 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.239131 kubelet[2118]: E1213 02:31:22.236680 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.239131 kubelet[2118]: W1213 02:31:22.236685 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.239131 kubelet[2118]: E1213 02:31:22.236690 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.239131 kubelet[2118]: E1213 02:31:22.236777 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.239395 kubelet[2118]: W1213 02:31:22.236782 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.239395 kubelet[2118]: E1213 02:31:22.236786 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:22.239395 kubelet[2118]: E1213 02:31:22.236876 2118 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:31:22.239395 kubelet[2118]: W1213 02:31:22.236881 2118 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:31:22.239395 kubelet[2118]: E1213 02:31:22.236886 2118 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:31:23.166760 kubelet[2118]: E1213 02:31:23.166727 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7z7tl" podUID="47c64936-f63c-409a-acf6-791447c02a65" Dec 13 02:31:23.437295 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3200876112.mount: Deactivated successfully. Dec 13 02:31:23.549262 env[1256]: time="2024-12-13T02:31:23.548874379Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:23.550717 env[1256]: time="2024-12-13T02:31:23.549893493Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 02:31:23.550717 env[1256]: time="2024-12-13T02:31:23.550345311Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:23.551258 env[1256]: time="2024-12-13T02:31:23.551109568Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:23.551501 env[1256]: time="2024-12-13T02:31:23.551481433Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:23.557004 env[1256]: time="2024-12-13T02:31:23.556588324Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 02:31:23.558246 env[1256]: time="2024-12-13T02:31:23.558205894Z" level=info msg="CreateContainer within sandbox \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:31:23.565893 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1525070197.mount: Deactivated successfully. Dec 13 02:31:23.567911 env[1256]: time="2024-12-13T02:31:23.567883368Z" level=info msg="CreateContainer within sandbox \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"dee4d3d4f7d7c6b4e91a605c41ed2d90e12dd8274ad7a7379349675628c95b00\"" Dec 13 02:31:23.569450 env[1256]: time="2024-12-13T02:31:23.568604958Z" level=info msg="StartContainer for \"dee4d3d4f7d7c6b4e91a605c41ed2d90e12dd8274ad7a7379349675628c95b00\"" Dec 13 02:31:23.585561 systemd[1]: Started cri-containerd-dee4d3d4f7d7c6b4e91a605c41ed2d90e12dd8274ad7a7379349675628c95b00.scope. Dec 13 02:31:23.618278 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 02:31:23.618352 kernel: audit: type=1400 audit(1734057083.613:981): avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.613000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.622230 kernel: audit: type=1300 audit(1734057083.613:981): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fc6e9932d18 items=0 ppid=2592 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:23.613000 audit[2666]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fc6e9932d18 items=0 ppid=2592 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:23.625729 kernel: audit: type=1327 audit(1734057083.613:981): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465653464336434663764376336623465393161363035633431656432 Dec 13 02:31:23.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465653464336434663764376336623465393161363035633431656432 Dec 13 02:31:23.628244 kernel: audit: type=1400 audit(1734057083.617:982): avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.617000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.630742 kernel: audit: type=1400 audit(1734057083.617:982): avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.617000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.633463 kernel: audit: type=1400 audit(1734057083.617:982): avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.617000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.636214 kernel: audit: type=1400 audit(1734057083.617:982): avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.617000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.617000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.617000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.643922 kernel: audit: type=1400 audit(1734057083.617:982): avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.644074 kernel: audit: type=1400 audit(1734057083.617:982): avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.644179 kernel: audit: type=1400 audit(1734057083.617:982): avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.617000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.617000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.617000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.617000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.617000 audit: BPF prog-id=126 op=LOAD Dec 13 02:31:23.617000 audit[2666]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00037a3d8 items=0 ppid=2592 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:23.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465653464336434663764376336623465393161363035633431656432 Dec 13 02:31:23.621000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.621000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.621000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.621000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.621000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.621000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.621000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.621000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.621000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.621000 audit: BPF prog-id=127 op=LOAD Dec 13 02:31:23.621000 audit[2666]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00037a428 items=0 ppid=2592 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:23.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465653464336434663764376336623465393161363035633431656432 Dec 13 02:31:23.625000 audit: BPF prog-id=127 op=UNLOAD Dec 13 02:31:23.625000 audit: BPF prog-id=126 op=UNLOAD Dec 13 02:31:23.625000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.625000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.625000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.625000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.625000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.625000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.625000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.625000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.625000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.625000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:23.625000 audit: BPF prog-id=128 op=LOAD Dec 13 02:31:23.625000 audit[2666]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00037a4b8 items=0 ppid=2592 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:23.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465653464336434663764376336623465393161363035633431656432 Dec 13 02:31:23.658607 systemd[1]: cri-containerd-dee4d3d4f7d7c6b4e91a605c41ed2d90e12dd8274ad7a7379349675628c95b00.scope: Deactivated successfully. Dec 13 02:31:23.660000 audit: BPF prog-id=128 op=UNLOAD Dec 13 02:31:23.663402 env[1256]: time="2024-12-13T02:31:23.663379749Z" level=info msg="StartContainer for \"dee4d3d4f7d7c6b4e91a605c41ed2d90e12dd8274ad7a7379349675628c95b00\" returns successfully" Dec 13 02:31:23.984340 env[1256]: time="2024-12-13T02:31:23.984302599Z" level=info msg="shim disconnected" id=dee4d3d4f7d7c6b4e91a605c41ed2d90e12dd8274ad7a7379349675628c95b00 Dec 13 02:31:23.984512 env[1256]: time="2024-12-13T02:31:23.984498284Z" level=warning msg="cleaning up after shim disconnected" id=dee4d3d4f7d7c6b4e91a605c41ed2d90e12dd8274ad7a7379349675628c95b00 namespace=k8s.io Dec 13 02:31:23.984576 env[1256]: time="2024-12-13T02:31:23.984565555Z" level=info msg="cleaning up dead shim" Dec 13 02:31:23.990267 env[1256]: time="2024-12-13T02:31:23.990241913Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:31:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2705 runtime=io.containerd.runc.v2\n" Dec 13 02:31:24.437153 systemd[1]: run-containerd-runc-k8s.io-dee4d3d4f7d7c6b4e91a605c41ed2d90e12dd8274ad7a7379349675628c95b00-runc.ig251K.mount: Deactivated successfully. Dec 13 02:31:24.437222 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-dee4d3d4f7d7c6b4e91a605c41ed2d90e12dd8274ad7a7379349675628c95b00-rootfs.mount: Deactivated successfully. Dec 13 02:31:25.166895 kubelet[2118]: E1213 02:31:25.166646 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7z7tl" podUID="47c64936-f63c-409a-acf6-791447c02a65" Dec 13 02:31:26.644533 env[1256]: time="2024-12-13T02:31:26.644493198Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:26.671574 env[1256]: time="2024-12-13T02:31:26.671542245Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:26.677367 env[1256]: time="2024-12-13T02:31:26.677344473Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:26.687631 env[1256]: time="2024-12-13T02:31:26.687609001Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:26.688044 env[1256]: time="2024-12-13T02:31:26.688020805Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 02:31:26.689785 env[1256]: time="2024-12-13T02:31:26.689533787Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 02:31:26.698359 env[1256]: time="2024-12-13T02:31:26.698336780Z" level=info msg="CreateContainer within sandbox \"e185bb17410685b672f5aec7ce118f8a87003eada908de6d593b8453fa83435f\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 02:31:26.739441 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2531210870.mount: Deactivated successfully. Dec 13 02:31:26.767845 env[1256]: time="2024-12-13T02:31:26.767818196Z" level=info msg="CreateContainer within sandbox \"e185bb17410685b672f5aec7ce118f8a87003eada908de6d593b8453fa83435f\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"87e67a64123767a89bf596ebe03e3c8af60c03ccda4d6edb03e3ca40aac04c4a\"" Dec 13 02:31:26.769367 env[1256]: time="2024-12-13T02:31:26.769347578Z" level=info msg="StartContainer for \"87e67a64123767a89bf596ebe03e3c8af60c03ccda4d6edb03e3ca40aac04c4a\"" Dec 13 02:31:26.788044 systemd[1]: Started cri-containerd-87e67a64123767a89bf596ebe03e3c8af60c03ccda4d6edb03e3ca40aac04c4a.scope. Dec 13 02:31:26.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.802000 audit: BPF prog-id=129 op=LOAD Dec 13 02:31:26.803000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.803000 audit[2733]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2534 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:26.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837653637613634313233373637613839626635393665626530336533 Dec 13 02:31:26.803000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.803000 audit[2733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2534 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:26.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837653637613634313233373637613839626635393665626530336533 Dec 13 02:31:26.803000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.803000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.803000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.803000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.803000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.803000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.803000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.803000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.803000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.803000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.803000 audit: BPF prog-id=130 op=LOAD Dec 13 02:31:26.803000 audit[2733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003484a0 items=0 ppid=2534 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:26.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837653637613634313233373637613839626635393665626530336533 Dec 13 02:31:26.804000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.804000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.804000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.804000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.804000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.804000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.804000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.804000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.804000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.804000 audit: BPF prog-id=131 op=LOAD Dec 13 02:31:26.804000 audit[2733]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003484e8 items=0 ppid=2534 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:26.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837653637613634313233373637613839626635393665626530336533 Dec 13 02:31:26.804000 audit: BPF prog-id=131 op=UNLOAD Dec 13 02:31:26.804000 audit: BPF prog-id=130 op=UNLOAD Dec 13 02:31:26.805000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.805000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.805000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.805000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.805000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.805000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.805000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.805000 audit[2733]: AVC avc: denied { perfmon } for pid=2733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.805000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.805000 audit[2733]: AVC avc: denied { bpf } for pid=2733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:26.805000 audit: BPF prog-id=132 op=LOAD Dec 13 02:31:26.805000 audit[2733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003488f8 items=0 ppid=2534 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:26.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837653637613634313233373637613839626635393665626530336533 Dec 13 02:31:26.833297 env[1256]: time="2024-12-13T02:31:26.833264345Z" level=info msg="StartContainer for \"87e67a64123767a89bf596ebe03e3c8af60c03ccda4d6edb03e3ca40aac04c4a\" returns successfully" Dec 13 02:31:27.166414 kubelet[2118]: E1213 02:31:27.166383 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7z7tl" podUID="47c64936-f63c-409a-acf6-791447c02a65" Dec 13 02:31:28.232920 kubelet[2118]: I1213 02:31:28.232903 2118 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:31:29.085442 kubelet[2118]: I1213 02:31:29.083248 2118 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-77dffb9d59-x6qcd" podStartSLOduration=3.122157638 podStartE2EDuration="8.083238797s" podCreationTimestamp="2024-12-13 02:31:21 +0000 UTC" firstStartedPulling="2024-12-13 02:31:21.727825075 +0000 UTC m=+13.706927541" lastFinishedPulling="2024-12-13 02:31:26.688906233 +0000 UTC m=+18.668008700" observedRunningTime="2024-12-13 02:31:27.248763917 +0000 UTC m=+19.227866400" watchObservedRunningTime="2024-12-13 02:31:29.083238797 +0000 UTC m=+21.062341267" Dec 13 02:31:29.120716 kernel: kauditd_printk_skb: 91 callbacks suppressed Dec 13 02:31:29.120829 kernel: audit: type=1325 audit(1734057089.112:1006): table=filter:95 family=2 entries=17 op=nft_register_rule pid=2765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:31:29.120861 kernel: audit: type=1300 audit(1734057089.112:1006): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffca8d53d20 a2=0 a3=7ffca8d53d0c items=0 ppid=2250 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:29.112000 audit[2765]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:31:29.112000 audit[2765]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffca8d53d20 a2=0 a3=7ffca8d53d0c items=0 ppid=2250 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:29.123233 kernel: audit: type=1327 audit(1734057089.112:1006): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:31:29.112000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:31:29.126000 audit[2765]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:31:29.130209 kernel: audit: type=1325 audit(1734057089.126:1007): table=nat:96 family=2 entries=19 op=nft_register_chain pid=2765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:31:29.126000 audit[2765]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffca8d53d20 a2=0 a3=7ffca8d53d0c items=0 ppid=2250 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:29.126000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:31:29.136930 kernel: audit: type=1300 audit(1734057089.126:1007): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffca8d53d20 a2=0 a3=7ffca8d53d0c items=0 ppid=2250 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:29.136985 kernel: audit: type=1327 audit(1734057089.126:1007): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:31:29.166313 kubelet[2118]: E1213 02:31:29.166248 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7z7tl" podUID="47c64936-f63c-409a-acf6-791447c02a65" Dec 13 02:31:31.167078 kubelet[2118]: E1213 02:31:31.167044 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7z7tl" podUID="47c64936-f63c-409a-acf6-791447c02a65" Dec 13 02:31:31.988187 env[1256]: time="2024-12-13T02:31:31.988146833Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:32.012498 env[1256]: time="2024-12-13T02:31:32.012467452Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:32.026283 env[1256]: time="2024-12-13T02:31:32.026249504Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:32.037604 env[1256]: time="2024-12-13T02:31:32.037580587Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:32.037950 env[1256]: time="2024-12-13T02:31:32.037925759Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 02:31:32.048894 env[1256]: time="2024-12-13T02:31:32.048867828Z" level=info msg="CreateContainer within sandbox \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:31:32.151939 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1625679712.mount: Deactivated successfully. Dec 13 02:31:32.236823 env[1256]: time="2024-12-13T02:31:32.236786349Z" level=info msg="CreateContainer within sandbox \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"328e1db5e822de702988a6894b68701d6c968bd449e9981564f73ddc7df65c4b\"" Dec 13 02:31:32.237112 env[1256]: time="2024-12-13T02:31:32.237096181Z" level=info msg="StartContainer for \"328e1db5e822de702988a6894b68701d6c968bd449e9981564f73ddc7df65c4b\"" Dec 13 02:31:32.264330 systemd[1]: Started cri-containerd-328e1db5e822de702988a6894b68701d6c968bd449e9981564f73ddc7df65c4b.scope. Dec 13 02:31:32.288382 kernel: audit: type=1400 audit(1734057092.279:1008): avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.288470 kernel: audit: type=1300 audit(1734057092.279:1008): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fb0b4952ac8 items=0 ppid=2592 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit[2774]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fb0b4952ac8 items=0 ppid=2592 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:32.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332386531646235653832326465373032393838613638393462363837 Dec 13 02:31:32.292404 kernel: audit: type=1327 audit(1734057092.279:1008): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332386531646235653832326465373032393838613638393462363837 Dec 13 02:31:32.292435 kernel: audit: type=1400 audit(1734057092.279:1009): avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit: BPF prog-id=133 op=LOAD Dec 13 02:31:32.279000 audit[2774]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00034dba8 items=0 ppid=2592 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:32.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332386531646235653832326465373032393838613638393462363837 Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.279000 audit: BPF prog-id=134 op=LOAD Dec 13 02:31:32.279000 audit[2774]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00034dbf8 items=0 ppid=2592 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:32.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332386531646235653832326465373032393838613638393462363837 Dec 13 02:31:32.280000 audit: BPF prog-id=134 op=UNLOAD Dec 13 02:31:32.280000 audit: BPF prog-id=133 op=UNLOAD Dec 13 02:31:32.280000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.280000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.280000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.280000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.280000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.280000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.280000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.280000 audit[2774]: AVC avc: denied { perfmon } for pid=2774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.280000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.280000 audit[2774]: AVC avc: denied { bpf } for pid=2774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:32.280000 audit: BPF prog-id=135 op=LOAD Dec 13 02:31:32.280000 audit[2774]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00034dc88 items=0 ppid=2592 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:32.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332386531646235653832326465373032393838613638393462363837 Dec 13 02:31:32.314135 env[1256]: time="2024-12-13T02:31:32.314063735Z" level=info msg="StartContainer for \"328e1db5e822de702988a6894b68701d6c968bd449e9981564f73ddc7df65c4b\" returns successfully" Dec 13 02:31:33.150270 systemd[1]: run-containerd-runc-k8s.io-328e1db5e822de702988a6894b68701d6c968bd449e9981564f73ddc7df65c4b-runc.ll1HKk.mount: Deactivated successfully. Dec 13 02:31:33.166776 kubelet[2118]: E1213 02:31:33.166505 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7z7tl" podUID="47c64936-f63c-409a-acf6-791447c02a65" Dec 13 02:31:33.295698 env[1256]: time="2024-12-13T02:31:33.295657345Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:31:33.297060 systemd[1]: cri-containerd-328e1db5e822de702988a6894b68701d6c968bd449e9981564f73ddc7df65c4b.scope: Deactivated successfully. Dec 13 02:31:33.300000 audit: BPF prog-id=135 op=UNLOAD Dec 13 02:31:33.316245 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-328e1db5e822de702988a6894b68701d6c968bd449e9981564f73ddc7df65c4b-rootfs.mount: Deactivated successfully. Dec 13 02:31:33.320281 env[1256]: time="2024-12-13T02:31:33.320090374Z" level=info msg="shim disconnected" id=328e1db5e822de702988a6894b68701d6c968bd449e9981564f73ddc7df65c4b Dec 13 02:31:33.320281 env[1256]: time="2024-12-13T02:31:33.320118118Z" level=warning msg="cleaning up after shim disconnected" id=328e1db5e822de702988a6894b68701d6c968bd449e9981564f73ddc7df65c4b namespace=k8s.io Dec 13 02:31:33.320281 env[1256]: time="2024-12-13T02:31:33.320128600Z" level=info msg="cleaning up dead shim" Dec 13 02:31:33.328123 env[1256]: time="2024-12-13T02:31:33.328088908Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:31:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2814 runtime=io.containerd.runc.v2\n" Dec 13 02:31:33.393249 kubelet[2118]: I1213 02:31:33.393225 2118 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 02:31:33.429712 systemd[1]: Created slice kubepods-burstable-pod317605d2_93ce_4fec_922f_d14e17bc8373.slice. Dec 13 02:31:33.433622 systemd[1]: Created slice kubepods-besteffort-podb15320b7_471e_4e9e_a144_a40693bd62f6.slice. Dec 13 02:31:33.436418 systemd[1]: Created slice kubepods-burstable-podb9e81d15_a4e1_40f7_97c8_5de9c4bc4ea7.slice. Dec 13 02:31:33.443721 systemd[1]: Created slice kubepods-besteffort-pod0b579c6e_3d61_42ac_9ad3_a083377b25bd.slice. Dec 13 02:31:33.446452 systemd[1]: Created slice kubepods-besteffort-podbcfd5457_45d1_48e8_ab9b_a02effca276a.slice. Dec 13 02:31:33.549187 kubelet[2118]: I1213 02:31:33.549115 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ttnxm\" (UniqueName: \"kubernetes.io/projected/bcfd5457-45d1-48e8-ab9b-a02effca276a-kube-api-access-ttnxm\") pod \"calico-kube-controllers-7755b4b488-k842l\" (UID: \"bcfd5457-45d1-48e8-ab9b-a02effca276a\") " pod="calico-system/calico-kube-controllers-7755b4b488-k842l" Dec 13 02:31:33.549187 kubelet[2118]: I1213 02:31:33.549148 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hgr6w\" (UniqueName: \"kubernetes.io/projected/317605d2-93ce-4fec-922f-d14e17bc8373-kube-api-access-hgr6w\") pod \"coredns-6f6b679f8f-tq85l\" (UID: \"317605d2-93ce-4fec-922f-d14e17bc8373\") " pod="kube-system/coredns-6f6b679f8f-tq85l" Dec 13 02:31:33.549187 kubelet[2118]: I1213 02:31:33.549160 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jcbl9\" (UniqueName: \"kubernetes.io/projected/0b579c6e-3d61-42ac-9ad3-a083377b25bd-kube-api-access-jcbl9\") pod \"calico-apiserver-5f6fd9c6dd-9s8w5\" (UID: \"0b579c6e-3d61-42ac-9ad3-a083377b25bd\") " pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-9s8w5" Dec 13 02:31:33.549339 kubelet[2118]: I1213 02:31:33.549196 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b15320b7-471e-4e9e-a144-a40693bd62f6-calico-apiserver-certs\") pod \"calico-apiserver-5f6fd9c6dd-r886t\" (UID: \"b15320b7-471e-4e9e-a144-a40693bd62f6\") " pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-r886t" Dec 13 02:31:33.549339 kubelet[2118]: I1213 02:31:33.549208 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g94gx\" (UniqueName: \"kubernetes.io/projected/b15320b7-471e-4e9e-a144-a40693bd62f6-kube-api-access-g94gx\") pod \"calico-apiserver-5f6fd9c6dd-r886t\" (UID: \"b15320b7-471e-4e9e-a144-a40693bd62f6\") " pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-r886t" Dec 13 02:31:33.549339 kubelet[2118]: I1213 02:31:33.549219 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7-config-volume\") pod \"coredns-6f6b679f8f-xkmf7\" (UID: \"b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7\") " pod="kube-system/coredns-6f6b679f8f-xkmf7" Dec 13 02:31:33.549339 kubelet[2118]: I1213 02:31:33.549232 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bcfd5457-45d1-48e8-ab9b-a02effca276a-tigera-ca-bundle\") pod \"calico-kube-controllers-7755b4b488-k842l\" (UID: \"bcfd5457-45d1-48e8-ab9b-a02effca276a\") " pod="calico-system/calico-kube-controllers-7755b4b488-k842l" Dec 13 02:31:33.549339 kubelet[2118]: I1213 02:31:33.549242 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/317605d2-93ce-4fec-922f-d14e17bc8373-config-volume\") pod \"coredns-6f6b679f8f-tq85l\" (UID: \"317605d2-93ce-4fec-922f-d14e17bc8373\") " pod="kube-system/coredns-6f6b679f8f-tq85l" Dec 13 02:31:33.549732 kubelet[2118]: I1213 02:31:33.549264 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xsrh2\" (UniqueName: \"kubernetes.io/projected/b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7-kube-api-access-xsrh2\") pod \"coredns-6f6b679f8f-xkmf7\" (UID: \"b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7\") " pod="kube-system/coredns-6f6b679f8f-xkmf7" Dec 13 02:31:33.549732 kubelet[2118]: I1213 02:31:33.549277 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/0b579c6e-3d61-42ac-9ad3-a083377b25bd-calico-apiserver-certs\") pod \"calico-apiserver-5f6fd9c6dd-9s8w5\" (UID: \"0b579c6e-3d61-42ac-9ad3-a083377b25bd\") " pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-9s8w5" Dec 13 02:31:33.732593 env[1256]: time="2024-12-13T02:31:33.732562006Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-tq85l,Uid:317605d2-93ce-4fec-922f-d14e17bc8373,Namespace:kube-system,Attempt:0,}" Dec 13 02:31:33.735352 env[1256]: time="2024-12-13T02:31:33.735335835Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f6fd9c6dd-r886t,Uid:b15320b7-471e-4e9e-a144-a40693bd62f6,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:31:33.738372 env[1256]: time="2024-12-13T02:31:33.738357589Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-xkmf7,Uid:b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7,Namespace:kube-system,Attempt:0,}" Dec 13 02:31:33.746246 env[1256]: time="2024-12-13T02:31:33.746218956Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f6fd9c6dd-9s8w5,Uid:0b579c6e-3d61-42ac-9ad3-a083377b25bd,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:31:33.749289 env[1256]: time="2024-12-13T02:31:33.749270247Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7755b4b488-k842l,Uid:bcfd5457-45d1-48e8-ab9b-a02effca276a,Namespace:calico-system,Attempt:0,}" Dec 13 02:31:33.987613 env[1256]: time="2024-12-13T02:31:33.987345256Z" level=error msg="Failed to destroy network for sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:33.987906 env[1256]: time="2024-12-13T02:31:33.987879060Z" level=error msg="encountered an error cleaning up failed sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:33.987954 env[1256]: time="2024-12-13T02:31:33.987921836Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-xkmf7,Uid:b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:33.991382 kubelet[2118]: E1213 02:31:33.989269 2118 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:33.992544 kubelet[2118]: E1213 02:31:33.991363 2118 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-xkmf7" Dec 13 02:31:33.992544 kubelet[2118]: E1213 02:31:33.992442 2118 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-xkmf7" Dec 13 02:31:33.992544 kubelet[2118]: E1213 02:31:33.992501 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-xkmf7_kube-system(b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-xkmf7_kube-system(b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-xkmf7" podUID="b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7" Dec 13 02:31:34.006485 env[1256]: time="2024-12-13T02:31:34.006447573Z" level=error msg="Failed to destroy network for sandbox \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.006710 env[1256]: time="2024-12-13T02:31:34.006691774Z" level=error msg="encountered an error cleaning up failed sandbox \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.006754 env[1256]: time="2024-12-13T02:31:34.006726957Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f6fd9c6dd-r886t,Uid:b15320b7-471e-4e9e-a144-a40693bd62f6,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.007489 kubelet[2118]: E1213 02:31:34.006850 2118 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.007489 kubelet[2118]: E1213 02:31:34.006893 2118 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-r886t" Dec 13 02:31:34.007489 kubelet[2118]: E1213 02:31:34.006909 2118 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-r886t" Dec 13 02:31:34.007599 kubelet[2118]: E1213 02:31:34.006950 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5f6fd9c6dd-r886t_calico-apiserver(b15320b7-471e-4e9e-a144-a40693bd62f6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5f6fd9c6dd-r886t_calico-apiserver(b15320b7-471e-4e9e-a144-a40693bd62f6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-r886t" podUID="b15320b7-471e-4e9e-a144-a40693bd62f6" Dec 13 02:31:34.013865 env[1256]: time="2024-12-13T02:31:34.013824309Z" level=error msg="Failed to destroy network for sandbox \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.014082 env[1256]: time="2024-12-13T02:31:34.014060667Z" level=error msg="encountered an error cleaning up failed sandbox \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.014120 env[1256]: time="2024-12-13T02:31:34.014096299Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7755b4b488-k842l,Uid:bcfd5457-45d1-48e8-ab9b-a02effca276a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.014720 env[1256]: time="2024-12-13T02:31:34.014195575Z" level=error msg="Failed to destroy network for sandbox \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.014773 kubelet[2118]: E1213 02:31:34.014228 2118 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.014773 kubelet[2118]: E1213 02:31:34.014267 2118 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7755b4b488-k842l" Dec 13 02:31:34.014773 kubelet[2118]: E1213 02:31:34.014280 2118 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7755b4b488-k842l" Dec 13 02:31:34.014913 kubelet[2118]: E1213 02:31:34.014306 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7755b4b488-k842l_calico-system(bcfd5457-45d1-48e8-ab9b-a02effca276a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7755b4b488-k842l_calico-system(bcfd5457-45d1-48e8-ab9b-a02effca276a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7755b4b488-k842l" podUID="bcfd5457-45d1-48e8-ab9b-a02effca276a" Dec 13 02:31:34.015155 env[1256]: time="2024-12-13T02:31:34.014513881Z" level=error msg="encountered an error cleaning up failed sandbox \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.015209 env[1256]: time="2024-12-13T02:31:34.015170445Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-tq85l,Uid:317605d2-93ce-4fec-922f-d14e17bc8373,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.015318 kubelet[2118]: E1213 02:31:34.015265 2118 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.015318 kubelet[2118]: E1213 02:31:34.015293 2118 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-tq85l" Dec 13 02:31:34.015318 kubelet[2118]: E1213 02:31:34.015304 2118 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-tq85l" Dec 13 02:31:34.015410 kubelet[2118]: E1213 02:31:34.015325 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-tq85l_kube-system(317605d2-93ce-4fec-922f-d14e17bc8373)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-tq85l_kube-system(317605d2-93ce-4fec-922f-d14e17bc8373)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-tq85l" podUID="317605d2-93ce-4fec-922f-d14e17bc8373" Dec 13 02:31:34.020650 env[1256]: time="2024-12-13T02:31:34.020619261Z" level=error msg="Failed to destroy network for sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.020949 env[1256]: time="2024-12-13T02:31:34.020914353Z" level=error msg="encountered an error cleaning up failed sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.021023 env[1256]: time="2024-12-13T02:31:34.021004535Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f6fd9c6dd-9s8w5,Uid:0b579c6e-3d61-42ac-9ad3-a083377b25bd,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.021212 kubelet[2118]: E1213 02:31:34.021191 2118 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.021267 kubelet[2118]: E1213 02:31:34.021223 2118 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-9s8w5" Dec 13 02:31:34.021267 kubelet[2118]: E1213 02:31:34.021235 2118 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-9s8w5" Dec 13 02:31:34.021267 kubelet[2118]: E1213 02:31:34.021260 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5f6fd9c6dd-9s8w5_calico-apiserver(0b579c6e-3d61-42ac-9ad3-a083377b25bd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5f6fd9c6dd-9s8w5_calico-apiserver(0b579c6e-3d61-42ac-9ad3-a083377b25bd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-9s8w5" podUID="0b579c6e-3d61-42ac-9ad3-a083377b25bd" Dec 13 02:31:34.254892 kubelet[2118]: I1213 02:31:34.253427 2118 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Dec 13 02:31:34.255686 kubelet[2118]: I1213 02:31:34.255670 2118 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Dec 13 02:31:34.260918 env[1256]: time="2024-12-13T02:31:34.260448049Z" level=info msg="StopPodSandbox for \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\"" Dec 13 02:31:34.261071 kubelet[2118]: I1213 02:31:34.260872 2118 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Dec 13 02:31:34.262247 kubelet[2118]: I1213 02:31:34.261774 2118 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Dec 13 02:31:34.262291 env[1256]: time="2024-12-13T02:31:34.261126871Z" level=info msg="StopPodSandbox for \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\"" Dec 13 02:31:34.262291 env[1256]: time="2024-12-13T02:31:34.261961759Z" level=info msg="StopPodSandbox for \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\"" Dec 13 02:31:34.263779 env[1256]: time="2024-12-13T02:31:34.263757676Z" level=info msg="StopPodSandbox for \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\"" Dec 13 02:31:34.270178 env[1256]: time="2024-12-13T02:31:34.269660401Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 02:31:34.270267 kubelet[2118]: I1213 02:31:34.269974 2118 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Dec 13 02:31:34.270359 env[1256]: time="2024-12-13T02:31:34.270335947Z" level=info msg="StopPodSandbox for \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\"" Dec 13 02:31:34.299782 env[1256]: time="2024-12-13T02:31:34.299731273Z" level=error msg="StopPodSandbox for \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\" failed" error="failed to destroy network for sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.299996 kubelet[2118]: E1213 02:31:34.299868 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Dec 13 02:31:34.299996 kubelet[2118]: E1213 02:31:34.299899 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8"} Dec 13 02:31:34.299996 kubelet[2118]: E1213 02:31:34.299942 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:31:34.299996 kubelet[2118]: E1213 02:31:34.299956 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-xkmf7" podUID="b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7" Dec 13 02:31:34.308134 env[1256]: time="2024-12-13T02:31:34.308090792Z" level=error msg="StopPodSandbox for \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\" failed" error="failed to destroy network for sandbox \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.308275 kubelet[2118]: E1213 02:31:34.308246 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Dec 13 02:31:34.308320 kubelet[2118]: E1213 02:31:34.308281 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a"} Dec 13 02:31:34.308320 kubelet[2118]: E1213 02:31:34.308309 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bcfd5457-45d1-48e8-ab9b-a02effca276a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:31:34.308462 kubelet[2118]: E1213 02:31:34.308328 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bcfd5457-45d1-48e8-ab9b-a02effca276a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7755b4b488-k842l" podUID="bcfd5457-45d1-48e8-ab9b-a02effca276a" Dec 13 02:31:34.330321 env[1256]: time="2024-12-13T02:31:34.330288314Z" level=error msg="StopPodSandbox for \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\" failed" error="failed to destroy network for sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.330592 kubelet[2118]: E1213 02:31:34.330563 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Dec 13 02:31:34.330664 kubelet[2118]: E1213 02:31:34.330602 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994"} Dec 13 02:31:34.330664 kubelet[2118]: E1213 02:31:34.330625 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0b579c6e-3d61-42ac-9ad3-a083377b25bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:31:34.330664 kubelet[2118]: E1213 02:31:34.330649 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0b579c6e-3d61-42ac-9ad3-a083377b25bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-9s8w5" podUID="0b579c6e-3d61-42ac-9ad3-a083377b25bd" Dec 13 02:31:34.335991 kubelet[2118]: E1213 02:31:34.331334 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Dec 13 02:31:34.335991 kubelet[2118]: E1213 02:31:34.331348 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d"} Dec 13 02:31:34.335991 kubelet[2118]: E1213 02:31:34.331361 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b15320b7-471e-4e9e-a144-a40693bd62f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:31:34.335991 kubelet[2118]: E1213 02:31:34.331372 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b15320b7-471e-4e9e-a144-a40693bd62f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-r886t" podUID="b15320b7-471e-4e9e-a144-a40693bd62f6" Dec 13 02:31:34.336121 env[1256]: time="2024-12-13T02:31:34.331247109Z" level=error msg="StopPodSandbox for \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\" failed" error="failed to destroy network for sandbox \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.336121 env[1256]: time="2024-12-13T02:31:34.331953079Z" level=error msg="StopPodSandbox for \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\" failed" error="failed to destroy network for sandbox \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:34.336191 kubelet[2118]: E1213 02:31:34.332013 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Dec 13 02:31:34.336191 kubelet[2118]: E1213 02:31:34.332027 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8"} Dec 13 02:31:34.336191 kubelet[2118]: E1213 02:31:34.332042 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"317605d2-93ce-4fec-922f-d14e17bc8373\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:31:34.336191 kubelet[2118]: E1213 02:31:34.332058 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"317605d2-93ce-4fec-922f-d14e17bc8373\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-tq85l" podUID="317605d2-93ce-4fec-922f-d14e17bc8373" Dec 13 02:31:35.169435 systemd[1]: Created slice kubepods-besteffort-pod47c64936_f63c_409a_acf6_791447c02a65.slice. Dec 13 02:31:35.177637 env[1256]: time="2024-12-13T02:31:35.170899884Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7z7tl,Uid:47c64936-f63c-409a-acf6-791447c02a65,Namespace:calico-system,Attempt:0,}" Dec 13 02:31:35.277615 env[1256]: time="2024-12-13T02:31:35.277583070Z" level=error msg="Failed to destroy network for sandbox \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:35.279015 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108-shm.mount: Deactivated successfully. Dec 13 02:31:35.285612 env[1256]: time="2024-12-13T02:31:35.279965784Z" level=error msg="encountered an error cleaning up failed sandbox \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:35.285612 env[1256]: time="2024-12-13T02:31:35.279999108Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7z7tl,Uid:47c64936-f63c-409a-acf6-791447c02a65,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:35.285682 kubelet[2118]: E1213 02:31:35.280122 2118 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:35.285682 kubelet[2118]: E1213 02:31:35.280171 2118 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7z7tl" Dec 13 02:31:35.285682 kubelet[2118]: E1213 02:31:35.280190 2118 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7z7tl" Dec 13 02:31:35.285867 kubelet[2118]: E1213 02:31:35.281244 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-7z7tl_calico-system(47c64936-f63c-409a-acf6-791447c02a65)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-7z7tl_calico-system(47c64936-f63c-409a-acf6-791447c02a65)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7z7tl" podUID="47c64936-f63c-409a-acf6-791447c02a65" Dec 13 02:31:36.274432 kubelet[2118]: I1213 02:31:36.274408 2118 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Dec 13 02:31:36.275777 env[1256]: time="2024-12-13T02:31:36.275753196Z" level=info msg="StopPodSandbox for \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\"" Dec 13 02:31:36.303670 env[1256]: time="2024-12-13T02:31:36.303639630Z" level=error msg="StopPodSandbox for \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\" failed" error="failed to destroy network for sandbox \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:36.309382 kubelet[2118]: E1213 02:31:36.303976 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Dec 13 02:31:36.309382 kubelet[2118]: E1213 02:31:36.304016 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108"} Dec 13 02:31:36.309382 kubelet[2118]: E1213 02:31:36.304042 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"47c64936-f63c-409a-acf6-791447c02a65\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:31:36.309382 kubelet[2118]: E1213 02:31:36.304055 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"47c64936-f63c-409a-acf6-791447c02a65\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7z7tl" podUID="47c64936-f63c-409a-acf6-791447c02a65" Dec 13 02:31:41.430124 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2758896327.mount: Deactivated successfully. Dec 13 02:31:41.468678 env[1256]: time="2024-12-13T02:31:41.468596079Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:41.472768 env[1256]: time="2024-12-13T02:31:41.472733347Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:41.475283 env[1256]: time="2024-12-13T02:31:41.475265654Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:41.476697 env[1256]: time="2024-12-13T02:31:41.476661534Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:31:41.477391 env[1256]: time="2024-12-13T02:31:41.477372415Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 02:31:41.497157 env[1256]: time="2024-12-13T02:31:41.497131178Z" level=info msg="CreateContainer within sandbox \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:31:41.505203 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount771105197.mount: Deactivated successfully. Dec 13 02:31:41.567168 env[1256]: time="2024-12-13T02:31:41.567127614Z" level=info msg="CreateContainer within sandbox \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4854e633b432d1c080c432cb130c8672d15e30f3fe89a12eac02967a0fd3e018\"" Dec 13 02:31:41.567826 env[1256]: time="2024-12-13T02:31:41.567476060Z" level=info msg="StartContainer for \"4854e633b432d1c080c432cb130c8672d15e30f3fe89a12eac02967a0fd3e018\"" Dec 13 02:31:41.578817 systemd[1]: Started cri-containerd-4854e633b432d1c080c432cb130c8672d15e30f3fe89a12eac02967a0fd3e018.scope. Dec 13 02:31:41.600000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.630741 kernel: kauditd_printk_skb: 40 callbacks suppressed Dec 13 02:31:41.631511 kernel: audit: type=1400 audit(1734057101.600:1015): avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.632083 kernel: audit: type=1300 audit(1734057101.600:1015): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7f040c0859b8 items=0 ppid=2592 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:41.632105 kernel: audit: type=1327 audit(1734057101.600:1015): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438353465363333623433326431633038306334333263623133306338 Dec 13 02:31:41.632119 kernel: audit: type=1400 audit(1734057101.600:1016): avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.632133 kernel: audit: type=1400 audit(1734057101.600:1016): avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.632146 kernel: audit: type=1400 audit(1734057101.600:1016): avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.632529 kernel: audit: type=1400 audit(1734057101.600:1016): avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.632553 kernel: audit: type=1400 audit(1734057101.600:1016): avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.632567 kernel: audit: type=1400 audit(1734057101.600:1016): avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.632580 kernel: audit: type=1400 audit(1734057101.600:1016): avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.600000 audit[3147]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7f040c0859b8 items=0 ppid=2592 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:41.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438353465363333623433326431633038306334333263623133306338 Dec 13 02:31:41.600000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.600000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.600000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.600000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.600000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.600000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.600000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.600000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.600000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.600000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.600000 audit: BPF prog-id=136 op=LOAD Dec 13 02:31:41.600000 audit[3147]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c000318708 items=0 ppid=2592 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:41.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438353465363333623433326431633038306334333263623133306338 Dec 13 02:31:41.608000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.608000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.608000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.608000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.608000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.608000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.608000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.608000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.608000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.608000 audit: BPF prog-id=137 op=LOAD Dec 13 02:31:41.608000 audit[3147]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c000318758 items=0 ppid=2592 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:41.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438353465363333623433326431633038306334333263623133306338 Dec 13 02:31:41.613000 audit: BPF prog-id=137 op=UNLOAD Dec 13 02:31:41.613000 audit: BPF prog-id=136 op=UNLOAD Dec 13 02:31:41.613000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.613000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.613000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.613000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.613000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.613000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.613000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.613000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.613000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.613000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:41.613000 audit: BPF prog-id=138 op=LOAD Dec 13 02:31:41.613000 audit[3147]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c0003187e8 items=0 ppid=2592 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:41.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438353465363333623433326431633038306334333263623133306338 Dec 13 02:31:41.637220 env[1256]: time="2024-12-13T02:31:41.637201189Z" level=info msg="StartContainer for \"4854e633b432d1c080c432cb130c8672d15e30f3fe89a12eac02967a0fd3e018\" returns successfully" Dec 13 02:31:42.491785 systemd[1]: run-containerd-runc-k8s.io-4854e633b432d1c080c432cb130c8672d15e30f3fe89a12eac02967a0fd3e018-runc.uVwvWZ.mount: Deactivated successfully. Dec 13 02:31:43.424606 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 02:31:43.424821 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 02:31:43.499625 systemd[1]: run-containerd-runc-k8s.io-4854e633b432d1c080c432cb130c8672d15e30f3fe89a12eac02967a0fd3e018-runc.ZNehnh.mount: Deactivated successfully. Dec 13 02:31:43.562997 systemd[1]: cri-containerd-4854e633b432d1c080c432cb130c8672d15e30f3fe89a12eac02967a0fd3e018.scope: Deactivated successfully. Dec 13 02:31:43.565000 audit: BPF prog-id=138 op=UNLOAD Dec 13 02:31:43.577459 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4854e633b432d1c080c432cb130c8672d15e30f3fe89a12eac02967a0fd3e018-rootfs.mount: Deactivated successfully. Dec 13 02:31:43.641958 env[1256]: time="2024-12-13T02:31:43.641924739Z" level=info msg="shim disconnected" id=4854e633b432d1c080c432cb130c8672d15e30f3fe89a12eac02967a0fd3e018 Dec 13 02:31:43.641958 env[1256]: time="2024-12-13T02:31:43.641956647Z" level=warning msg="cleaning up after shim disconnected" id=4854e633b432d1c080c432cb130c8672d15e30f3fe89a12eac02967a0fd3e018 namespace=k8s.io Dec 13 02:31:43.656616 env[1256]: time="2024-12-13T02:31:43.641964852Z" level=info msg="cleaning up dead shim" Dec 13 02:31:43.656616 env[1256]: time="2024-12-13T02:31:43.646012246Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:31:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3245 runtime=io.containerd.runc.v2\n" Dec 13 02:31:44.430328 kubelet[2118]: I1213 02:31:44.430301 2118 scope.go:117] "RemoveContainer" containerID="4854e633b432d1c080c432cb130c8672d15e30f3fe89a12eac02967a0fd3e018" Dec 13 02:31:44.433208 env[1256]: time="2024-12-13T02:31:44.433174714Z" level=info msg="CreateContainer within sandbox \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\" for container &ContainerMetadata{Name:calico-node,Attempt:1,}" Dec 13 02:31:44.445090 env[1256]: time="2024-12-13T02:31:44.445061363Z" level=info msg="CreateContainer within sandbox \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\" for &ContainerMetadata{Name:calico-node,Attempt:1,} returns container id \"ba26af7c6f8bedc07c7bd371d5bbc9fafd2adcc1f4e0bc9e68c93940e0219bca\"" Dec 13 02:31:44.445626 env[1256]: time="2024-12-13T02:31:44.445605478Z" level=info msg="StartContainer for \"ba26af7c6f8bedc07c7bd371d5bbc9fafd2adcc1f4e0bc9e68c93940e0219bca\"" Dec 13 02:31:44.459927 systemd[1]: Started cri-containerd-ba26af7c6f8bedc07c7bd371d5bbc9fafd2adcc1f4e0bc9e68c93940e0219bca.scope. Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7fb6eaff82f8 items=0 ppid=2592 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:44.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261323661663763366638626564633037633762643337316435626263 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit: BPF prog-id=139 op=LOAD Dec 13 02:31:44.470000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c000024b28 items=0 ppid=2592 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:44.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261323661663763366638626564633037633762643337316435626263 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit: BPF prog-id=140 op=LOAD Dec 13 02:31:44.470000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c000024b78 items=0 ppid=2592 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:44.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261323661663763366638626564633037633762643337316435626263 Dec 13 02:31:44.470000 audit: BPF prog-id=140 op=UNLOAD Dec 13 02:31:44.470000 audit: BPF prog-id=139 op=UNLOAD Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:44.470000 audit: BPF prog-id=141 op=LOAD Dec 13 02:31:44.470000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c000024c08 items=0 ppid=2592 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:44.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261323661663763366638626564633037633762643337316435626263 Dec 13 02:31:44.481843 env[1256]: time="2024-12-13T02:31:44.481752546Z" level=info msg="StartContainer for \"ba26af7c6f8bedc07c7bd371d5bbc9fafd2adcc1f4e0bc9e68c93940e0219bca\" returns successfully" Dec 13 02:31:44.494977 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2235811719.mount: Deactivated successfully. Dec 13 02:31:44.524668 systemd[1]: cri-containerd-ba26af7c6f8bedc07c7bd371d5bbc9fafd2adcc1f4e0bc9e68c93940e0219bca.scope: Deactivated successfully. Dec 13 02:31:44.526000 audit: BPF prog-id=141 op=UNLOAD Dec 13 02:31:44.537470 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ba26af7c6f8bedc07c7bd371d5bbc9fafd2adcc1f4e0bc9e68c93940e0219bca-rootfs.mount: Deactivated successfully. Dec 13 02:31:44.595254 env[1256]: time="2024-12-13T02:31:44.595222098Z" level=info msg="shim disconnected" id=ba26af7c6f8bedc07c7bd371d5bbc9fafd2adcc1f4e0bc9e68c93940e0219bca Dec 13 02:31:44.595254 env[1256]: time="2024-12-13T02:31:44.595251612Z" level=warning msg="cleaning up after shim disconnected" id=ba26af7c6f8bedc07c7bd371d5bbc9fafd2adcc1f4e0bc9e68c93940e0219bca namespace=k8s.io Dec 13 02:31:44.595437 env[1256]: time="2024-12-13T02:31:44.595262857Z" level=info msg="cleaning up dead shim" Dec 13 02:31:44.600038 env[1256]: time="2024-12-13T02:31:44.600011246Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:31:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3305 runtime=io.containerd.runc.v2\n" Dec 13 02:31:45.429622 kubelet[2118]: I1213 02:31:45.429598 2118 scope.go:117] "RemoveContainer" containerID="4854e633b432d1c080c432cb130c8672d15e30f3fe89a12eac02967a0fd3e018" Dec 13 02:31:45.429741 kubelet[2118]: I1213 02:31:45.429651 2118 scope.go:117] "RemoveContainer" containerID="ba26af7c6f8bedc07c7bd371d5bbc9fafd2adcc1f4e0bc9e68c93940e0219bca" Dec 13 02:31:45.429772 kubelet[2118]: E1213 02:31:45.429739 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-8rmwh_calico-system(d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa)\"" pod="calico-system/calico-node-8rmwh" podUID="d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" Dec 13 02:31:45.430384 env[1256]: time="2024-12-13T02:31:45.430365974Z" level=info msg="RemoveContainer for \"4854e633b432d1c080c432cb130c8672d15e30f3fe89a12eac02967a0fd3e018\"" Dec 13 02:31:45.432096 env[1256]: time="2024-12-13T02:31:45.432080768Z" level=info msg="RemoveContainer for \"4854e633b432d1c080c432cb130c8672d15e30f3fe89a12eac02967a0fd3e018\" returns successfully" Dec 13 02:31:46.167416 env[1256]: time="2024-12-13T02:31:46.167387816Z" level=info msg="StopPodSandbox for \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\"" Dec 13 02:31:46.167589 env[1256]: time="2024-12-13T02:31:46.167574743Z" level=info msg="StopPodSandbox for \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\"" Dec 13 02:31:46.167905 env[1256]: time="2024-12-13T02:31:46.167889230Z" level=info msg="StopPodSandbox for \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\"" Dec 13 02:31:46.197062 env[1256]: time="2024-12-13T02:31:46.197023662Z" level=error msg="StopPodSandbox for \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\" failed" error="failed to destroy network for sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:46.197286 kubelet[2118]: E1213 02:31:46.197251 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Dec 13 02:31:46.197523 kubelet[2118]: E1213 02:31:46.197289 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994"} Dec 13 02:31:46.197523 kubelet[2118]: E1213 02:31:46.197315 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0b579c6e-3d61-42ac-9ad3-a083377b25bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:31:46.197523 kubelet[2118]: E1213 02:31:46.197329 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0b579c6e-3d61-42ac-9ad3-a083377b25bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-9s8w5" podUID="0b579c6e-3d61-42ac-9ad3-a083377b25bd" Dec 13 02:31:46.203640 env[1256]: time="2024-12-13T02:31:46.203604137Z" level=error msg="StopPodSandbox for \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\" failed" error="failed to destroy network for sandbox \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:46.203882 kubelet[2118]: E1213 02:31:46.203858 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Dec 13 02:31:46.203933 kubelet[2118]: E1213 02:31:46.203894 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a"} Dec 13 02:31:46.203933 kubelet[2118]: E1213 02:31:46.203916 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bcfd5457-45d1-48e8-ab9b-a02effca276a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:31:46.204003 kubelet[2118]: E1213 02:31:46.203930 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bcfd5457-45d1-48e8-ab9b-a02effca276a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7755b4b488-k842l" podUID="bcfd5457-45d1-48e8-ab9b-a02effca276a" Dec 13 02:31:46.205257 env[1256]: time="2024-12-13T02:31:46.205226532Z" level=error msg="StopPodSandbox for \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\" failed" error="failed to destroy network for sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:46.205472 kubelet[2118]: E1213 02:31:46.205394 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Dec 13 02:31:46.205472 kubelet[2118]: E1213 02:31:46.205415 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8"} Dec 13 02:31:46.205472 kubelet[2118]: E1213 02:31:46.205440 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:31:46.205472 kubelet[2118]: E1213 02:31:46.205458 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-xkmf7" podUID="b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7" Dec 13 02:31:46.431687 kubelet[2118]: I1213 02:31:46.431124 2118 scope.go:117] "RemoveContainer" containerID="ba26af7c6f8bedc07c7bd371d5bbc9fafd2adcc1f4e0bc9e68c93940e0219bca" Dec 13 02:31:46.431907 kubelet[2118]: E1213 02:31:46.431886 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-8rmwh_calico-system(d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa)\"" pod="calico-system/calico-node-8rmwh" podUID="d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" Dec 13 02:31:47.167449 env[1256]: time="2024-12-13T02:31:47.167421163Z" level=info msg="StopPodSandbox for \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\"" Dec 13 02:31:47.184755 env[1256]: time="2024-12-13T02:31:47.184714414Z" level=error msg="StopPodSandbox for \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\" failed" error="failed to destroy network for sandbox \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:47.185075 kubelet[2118]: E1213 02:31:47.184978 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Dec 13 02:31:47.185075 kubelet[2118]: E1213 02:31:47.185016 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108"} Dec 13 02:31:47.185075 kubelet[2118]: E1213 02:31:47.185039 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"47c64936-f63c-409a-acf6-791447c02a65\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:31:47.185075 kubelet[2118]: E1213 02:31:47.185054 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"47c64936-f63c-409a-acf6-791447c02a65\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7z7tl" podUID="47c64936-f63c-409a-acf6-791447c02a65" Dec 13 02:31:49.167396 env[1256]: time="2024-12-13T02:31:49.167082893Z" level=info msg="StopPodSandbox for \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\"" Dec 13 02:31:49.167396 env[1256]: time="2024-12-13T02:31:49.167194582Z" level=info msg="StopPodSandbox for \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\"" Dec 13 02:31:49.189301 env[1256]: time="2024-12-13T02:31:49.189256413Z" level=error msg="StopPodSandbox for \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\" failed" error="failed to destroy network for sandbox \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:49.189577 kubelet[2118]: E1213 02:31:49.189473 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Dec 13 02:31:49.189577 kubelet[2118]: E1213 02:31:49.189510 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d"} Dec 13 02:31:49.189577 kubelet[2118]: E1213 02:31:49.189531 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b15320b7-471e-4e9e-a144-a40693bd62f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:31:49.189577 kubelet[2118]: E1213 02:31:49.189547 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b15320b7-471e-4e9e-a144-a40693bd62f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-r886t" podUID="b15320b7-471e-4e9e-a144-a40693bd62f6" Dec 13 02:31:49.189945 env[1256]: time="2024-12-13T02:31:49.189923668Z" level=error msg="StopPodSandbox for \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\" failed" error="failed to destroy network for sandbox \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:49.190110 kubelet[2118]: E1213 02:31:49.190048 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Dec 13 02:31:49.190110 kubelet[2118]: E1213 02:31:49.190065 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8"} Dec 13 02:31:49.190110 kubelet[2118]: E1213 02:31:49.190080 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"317605d2-93ce-4fec-922f-d14e17bc8373\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:31:49.190110 kubelet[2118]: E1213 02:31:49.190093 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"317605d2-93ce-4fec-922f-d14e17bc8373\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-tq85l" podUID="317605d2-93ce-4fec-922f-d14e17bc8373" Dec 13 02:31:54.912399 kubelet[2118]: I1213 02:31:54.912378 2118 scope.go:117] "RemoveContainer" containerID="ba26af7c6f8bedc07c7bd371d5bbc9fafd2adcc1f4e0bc9e68c93940e0219bca" Dec 13 02:31:54.917972 env[1256]: time="2024-12-13T02:31:54.914471961Z" level=info msg="CreateContainer within sandbox \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\" for container &ContainerMetadata{Name:calico-node,Attempt:2,}" Dec 13 02:31:54.948774 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2730969445.mount: Deactivated successfully. Dec 13 02:31:54.951990 env[1256]: time="2024-12-13T02:31:54.951965008Z" level=info msg="CreateContainer within sandbox \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\" for &ContainerMetadata{Name:calico-node,Attempt:2,} returns container id \"fed5ac2366209c8b411d94cf04d17176286485cca50627d7a53151b1551c2d6d\"" Dec 13 02:31:54.952526 env[1256]: time="2024-12-13T02:31:54.952507329Z" level=info msg="StartContainer for \"fed5ac2366209c8b411d94cf04d17176286485cca50627d7a53151b1551c2d6d\"" Dec 13 02:31:54.966294 systemd[1]: Started cri-containerd-fed5ac2366209c8b411d94cf04d17176286485cca50627d7a53151b1551c2d6d.scope. Dec 13 02:31:54.982000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.984631 kernel: kauditd_printk_skb: 78 callbacks suppressed Dec 13 02:31:54.984679 kernel: audit: type=1400 audit(1734057114.982:1029): avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.982000 audit[3448]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f2453d4e248 items=0 ppid=2592 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:54.990867 kernel: audit: type=1300 audit(1734057114.982:1029): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f2453d4e248 items=0 ppid=2592 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:54.991219 kernel: audit: type=1327 audit(1734057114.982:1029): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665643561633233363632303963386234313164393463663034643137 Dec 13 02:31:54.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665643561633233363632303963386234313164393463663034643137 Dec 13 02:31:54.982000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.997104 kernel: audit: type=1400 audit(1734057114.982:1030): avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.982000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:55.000188 kernel: audit: type=1400 audit(1734057114.982:1030): avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.982000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:55.003183 kernel: audit: type=1400 audit(1734057114.982:1030): avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.982000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.982000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:55.008594 kernel: audit: type=1400 audit(1734057114.982:1030): avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:55.008699 kernel: audit: type=1400 audit(1734057114.982:1030): avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.982000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.982000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:55.014975 kernel: audit: type=1400 audit(1734057114.982:1030): avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:55.041206 kernel: audit: type=1400 audit(1734057114.982:1030): avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.982000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.982000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.982000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.982000 audit: BPF prog-id=142 op=LOAD Dec 13 02:31:54.982000 audit[3448]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000394518 items=0 ppid=2592 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:54.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665643561633233363632303963386234313164393463663034643137 Dec 13 02:31:54.989000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.989000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.989000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.989000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.989000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.989000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.989000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.989000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.989000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.989000 audit: BPF prog-id=143 op=LOAD Dec 13 02:31:54.989000 audit[3448]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000394568 items=0 ppid=2592 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:54.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665643561633233363632303963386234313164393463663034643137 Dec 13 02:31:54.990000 audit: BPF prog-id=143 op=UNLOAD Dec 13 02:31:54.990000 audit: BPF prog-id=142 op=UNLOAD Dec 13 02:31:54.990000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.990000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.990000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.990000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.990000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.990000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.990000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.990000 audit[3448]: AVC avc: denied { perfmon } for pid=3448 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.990000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.990000 audit[3448]: AVC avc: denied { bpf } for pid=3448 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:31:54.990000 audit: BPF prog-id=144 op=LOAD Dec 13 02:31:54.990000 audit[3448]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003945f8 items=0 ppid=2592 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:31:54.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665643561633233363632303963386234313164393463663034643137 Dec 13 02:31:55.048391 env[1256]: time="2024-12-13T02:31:55.047040867Z" level=info msg="StartContainer for \"fed5ac2366209c8b411d94cf04d17176286485cca50627d7a53151b1551c2d6d\" returns successfully" Dec 13 02:31:55.084245 systemd[1]: cri-containerd-fed5ac2366209c8b411d94cf04d17176286485cca50627d7a53151b1551c2d6d.scope: Deactivated successfully. Dec 13 02:31:55.086000 audit: BPF prog-id=144 op=UNLOAD Dec 13 02:31:55.097339 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fed5ac2366209c8b411d94cf04d17176286485cca50627d7a53151b1551c2d6d-rootfs.mount: Deactivated successfully. Dec 13 02:31:55.104406 env[1256]: time="2024-12-13T02:31:55.104374319Z" level=info msg="shim disconnected" id=fed5ac2366209c8b411d94cf04d17176286485cca50627d7a53151b1551c2d6d Dec 13 02:31:55.104406 env[1256]: time="2024-12-13T02:31:55.104403843Z" level=warning msg="cleaning up after shim disconnected" id=fed5ac2366209c8b411d94cf04d17176286485cca50627d7a53151b1551c2d6d namespace=k8s.io Dec 13 02:31:55.104406 env[1256]: time="2024-12-13T02:31:55.104410474Z" level=info msg="cleaning up dead shim" Dec 13 02:31:55.109624 env[1256]: time="2024-12-13T02:31:55.109593014Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:31:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3492 runtime=io.containerd.runc.v2\n" Dec 13 02:31:55.442236 kubelet[2118]: I1213 02:31:55.441713 2118 scope.go:117] "RemoveContainer" containerID="ba26af7c6f8bedc07c7bd371d5bbc9fafd2adcc1f4e0bc9e68c93940e0219bca" Dec 13 02:31:55.442236 kubelet[2118]: I1213 02:31:55.441926 2118 scope.go:117] "RemoveContainer" containerID="fed5ac2366209c8b411d94cf04d17176286485cca50627d7a53151b1551c2d6d" Dec 13 02:31:55.442236 kubelet[2118]: E1213 02:31:55.442005 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-8rmwh_calico-system(d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa)\"" pod="calico-system/calico-node-8rmwh" podUID="d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" Dec 13 02:31:55.445151 env[1256]: time="2024-12-13T02:31:55.445128089Z" level=info msg="RemoveContainer for \"ba26af7c6f8bedc07c7bd371d5bbc9fafd2adcc1f4e0bc9e68c93940e0219bca\"" Dec 13 02:31:55.446714 env[1256]: time="2024-12-13T02:31:55.446696015Z" level=info msg="RemoveContainer for \"ba26af7c6f8bedc07c7bd371d5bbc9fafd2adcc1f4e0bc9e68c93940e0219bca\" returns successfully" Dec 13 02:31:58.167726 env[1256]: time="2024-12-13T02:31:58.167696703Z" level=info msg="StopPodSandbox for \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\"" Dec 13 02:31:58.168181 env[1256]: time="2024-12-13T02:31:58.167763891Z" level=info msg="StopPodSandbox for \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\"" Dec 13 02:31:58.186793 env[1256]: time="2024-12-13T02:31:58.186754501Z" level=error msg="StopPodSandbox for \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\" failed" error="failed to destroy network for sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:58.187095 kubelet[2118]: E1213 02:31:58.186895 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Dec 13 02:31:58.187095 kubelet[2118]: E1213 02:31:58.186941 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8"} Dec 13 02:31:58.187095 kubelet[2118]: E1213 02:31:58.186965 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:31:58.187095 kubelet[2118]: E1213 02:31:58.186980 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-xkmf7" podUID="b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7" Dec 13 02:31:58.188330 env[1256]: time="2024-12-13T02:31:58.188309852Z" level=error msg="StopPodSandbox for \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\" failed" error="failed to destroy network for sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:31:58.188518 kubelet[2118]: E1213 02:31:58.188448 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Dec 13 02:31:58.188518 kubelet[2118]: E1213 02:31:58.188475 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994"} Dec 13 02:31:58.188518 kubelet[2118]: E1213 02:31:58.188491 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0b579c6e-3d61-42ac-9ad3-a083377b25bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:31:58.188518 kubelet[2118]: E1213 02:31:58.188504 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0b579c6e-3d61-42ac-9ad3-a083377b25bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-9s8w5" podUID="0b579c6e-3d61-42ac-9ad3-a083377b25bd" Dec 13 02:32:00.169323 env[1256]: time="2024-12-13T02:32:00.167595089Z" level=info msg="StopPodSandbox for \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\"" Dec 13 02:32:00.169323 env[1256]: time="2024-12-13T02:32:00.168459202Z" level=info msg="StopPodSandbox for \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\"" Dec 13 02:32:00.195022 env[1256]: time="2024-12-13T02:32:00.194968889Z" level=error msg="StopPodSandbox for \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\" failed" error="failed to destroy network for sandbox \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:00.195260 kubelet[2118]: E1213 02:32:00.195224 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Dec 13 02:32:00.195455 kubelet[2118]: E1213 02:32:00.195271 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a"} Dec 13 02:32:00.195455 kubelet[2118]: E1213 02:32:00.195297 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bcfd5457-45d1-48e8-ab9b-a02effca276a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:32:00.195455 kubelet[2118]: E1213 02:32:00.195311 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bcfd5457-45d1-48e8-ab9b-a02effca276a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7755b4b488-k842l" podUID="bcfd5457-45d1-48e8-ab9b-a02effca276a" Dec 13 02:32:00.199135 env[1256]: time="2024-12-13T02:32:00.199090536Z" level=error msg="StopPodSandbox for \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\" failed" error="failed to destroy network for sandbox \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:00.199372 kubelet[2118]: E1213 02:32:00.199344 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Dec 13 02:32:00.199424 kubelet[2118]: E1213 02:32:00.199382 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108"} Dec 13 02:32:00.199424 kubelet[2118]: E1213 02:32:00.199406 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"47c64936-f63c-409a-acf6-791447c02a65\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:32:00.199424 kubelet[2118]: E1213 02:32:00.199421 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"47c64936-f63c-409a-acf6-791447c02a65\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7z7tl" podUID="47c64936-f63c-409a-acf6-791447c02a65" Dec 13 02:32:02.167756 env[1256]: time="2024-12-13T02:32:02.167729160Z" level=info msg="StopPodSandbox for \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\"" Dec 13 02:32:02.193297 env[1256]: time="2024-12-13T02:32:02.193260297Z" level=error msg="StopPodSandbox for \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\" failed" error="failed to destroy network for sandbox \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:02.193619 kubelet[2118]: E1213 02:32:02.193513 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Dec 13 02:32:02.193619 kubelet[2118]: E1213 02:32:02.193555 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8"} Dec 13 02:32:02.193619 kubelet[2118]: E1213 02:32:02.193582 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"317605d2-93ce-4fec-922f-d14e17bc8373\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:32:02.193619 kubelet[2118]: E1213 02:32:02.193597 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"317605d2-93ce-4fec-922f-d14e17bc8373\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-tq85l" podUID="317605d2-93ce-4fec-922f-d14e17bc8373" Dec 13 02:32:03.741000 audit[1967]: AVC avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:03.746603 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 02:32:03.746676 kernel: audit: type=1400 audit(1734057123.741:1037): avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:03.750074 kernel: audit: type=1400 audit(1734057123.741:1036): avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:03.741000 audit[1967]: AVC avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:03.741000 audit[1967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b71a60 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:32:03.765386 kernel: audit: type=1300 audit(1734057123.741:1036): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b71a60 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:32:03.765416 kernel: audit: type=1327 audit(1734057123.741:1036): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:32:03.765433 kernel: audit: type=1300 audit(1734057123.741:1037): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002808f00 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:32:03.765447 kernel: audit: type=1327 audit(1734057123.741:1037): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:32:03.741000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:32:03.741000 audit[1967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002808f00 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:32:03.741000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:32:04.167925 env[1256]: time="2024-12-13T02:32:04.167839946Z" level=info msg="StopPodSandbox for \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\"" Dec 13 02:32:04.184564 env[1256]: time="2024-12-13T02:32:04.184518375Z" level=error msg="StopPodSandbox for \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\" failed" error="failed to destroy network for sandbox \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:04.184746 kubelet[2118]: E1213 02:32:04.184718 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Dec 13 02:32:04.184960 kubelet[2118]: E1213 02:32:04.184754 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d"} Dec 13 02:32:04.184960 kubelet[2118]: E1213 02:32:04.184788 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b15320b7-471e-4e9e-a144-a40693bd62f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:32:04.184960 kubelet[2118]: E1213 02:32:04.184806 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b15320b7-471e-4e9e-a144-a40693bd62f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-r886t" podUID="b15320b7-471e-4e9e-a144-a40693bd62f6" Dec 13 02:32:05.129000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:05.129000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00befbda0 a2=fc6 a3=0 items=0 ppid=1821 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 key=(null) Dec 13 02:32:05.145192 kernel: audit: type=1400 audit(1734057125.129:1038): avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:05.145228 kernel: audit: type=1300 audit(1734057125.129:1038): arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00befbda0 a2=fc6 a3=0 items=0 ppid=1821 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 key=(null) Dec 13 02:32:05.151885 kernel: audit: type=1327 audit(1734057125.129:1038): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:32:05.151909 kernel: audit: type=1400 audit(1734057125.147:1039): avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:05.129000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:32:05.147000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:05.147000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0093710e0 a2=fc6 a3=0 items=0 ppid=1821 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 key=(null) Dec 13 02:32:05.147000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:32:05.150000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:05.150000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0093f6d80 a2=fc6 a3=0 items=0 ppid=1821 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 key=(null) Dec 13 02:32:05.150000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:32:05.150000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:05.150000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00befbdc0 a2=fc6 a3=0 items=0 ppid=1821 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 key=(null) Dec 13 02:32:05.150000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:32:05.151000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7294 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:05.151000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c009371140 a2=fc6 a3=0 items=0 ppid=1821 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 key=(null) Dec 13 02:32:05.151000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:32:05.151000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:05.151000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c009371170 a2=fc6 a3=0 items=0 ppid=1821 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 key=(null) Dec 13 02:32:05.151000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:32:07.167490 kubelet[2118]: I1213 02:32:07.167199 2118 scope.go:117] "RemoveContainer" containerID="fed5ac2366209c8b411d94cf04d17176286485cca50627d7a53151b1551c2d6d" Dec 13 02:32:07.167490 kubelet[2118]: E1213 02:32:07.167289 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-8rmwh_calico-system(d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa)\"" pod="calico-system/calico-node-8rmwh" podUID="d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" Dec 13 02:32:10.166814 env[1256]: time="2024-12-13T02:32:10.166770225Z" level=info msg="StopPodSandbox for \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\"" Dec 13 02:32:10.186396 env[1256]: time="2024-12-13T02:32:10.186355952Z" level=error msg="StopPodSandbox for \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\" failed" error="failed to destroy network for sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:10.186665 kubelet[2118]: E1213 02:32:10.186563 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Dec 13 02:32:10.186665 kubelet[2118]: E1213 02:32:10.186600 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8"} Dec 13 02:32:10.186665 kubelet[2118]: E1213 02:32:10.186622 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:32:10.186665 kubelet[2118]: E1213 02:32:10.186637 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-xkmf7" podUID="b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7" Dec 13 02:32:11.811000 audit[1967]: AVC avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:11.817637 kernel: kauditd_printk_skb: 14 callbacks suppressed Dec 13 02:32:11.817694 kernel: audit: type=1400 audit(1734057131.811:1044): avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:11.811000 audit[1967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a11da0 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:32:11.824649 kernel: audit: type=1300 audit(1734057131.811:1044): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a11da0 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:32:11.824686 kernel: audit: type=1327 audit(1734057131.811:1044): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:32:11.811000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:32:11.827947 kernel: audit: type=1400 audit(1734057131.811:1045): avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:11.811000 audit[1967]: AVC avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:11.811000 audit[1967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002a11dc0 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:32:11.834874 kernel: audit: type=1300 audit(1734057131.811:1045): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002a11dc0 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:32:11.834925 kernel: audit: type=1327 audit(1734057131.811:1045): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:32:11.811000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:32:11.816000 audit[1967]: AVC avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:11.841219 kernel: audit: type=1400 audit(1734057131.816:1046): avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:11.841261 kernel: audit: type=1300 audit(1734057131.816:1046): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a11de0 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:32:11.816000 audit[1967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a11de0 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:32:11.816000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:32:11.833000 audit[1967]: AVC avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:11.851478 kernel: audit: type=1327 audit(1734057131.816:1046): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:32:11.851521 kernel: audit: type=1400 audit(1734057131.833:1047): avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:32:11.833000 audit[1967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b44560 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:32:11.833000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:32:13.167025 env[1256]: time="2024-12-13T02:32:13.166994076Z" level=info msg="StopPodSandbox for \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\"" Dec 13 02:32:13.167305 env[1256]: time="2024-12-13T02:32:13.167225981Z" level=info msg="StopPodSandbox for \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\"" Dec 13 02:32:13.167398 env[1256]: time="2024-12-13T02:32:13.167381724Z" level=info msg="StopPodSandbox for \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\"" Dec 13 02:32:13.192866 env[1256]: time="2024-12-13T02:32:13.192824846Z" level=error msg="StopPodSandbox for \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\" failed" error="failed to destroy network for sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:13.193071 kubelet[2118]: E1213 02:32:13.193037 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Dec 13 02:32:13.193287 kubelet[2118]: E1213 02:32:13.193071 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994"} Dec 13 02:32:13.193287 kubelet[2118]: E1213 02:32:13.193094 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0b579c6e-3d61-42ac-9ad3-a083377b25bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:32:13.193287 kubelet[2118]: E1213 02:32:13.193108 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0b579c6e-3d61-42ac-9ad3-a083377b25bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-9s8w5" podUID="0b579c6e-3d61-42ac-9ad3-a083377b25bd" Dec 13 02:32:13.198605 env[1256]: time="2024-12-13T02:32:13.198578566Z" level=error msg="StopPodSandbox for \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\" failed" error="failed to destroy network for sandbox \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:13.198950 kubelet[2118]: E1213 02:32:13.198855 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Dec 13 02:32:13.198950 kubelet[2118]: E1213 02:32:13.198894 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a"} Dec 13 02:32:13.198950 kubelet[2118]: E1213 02:32:13.198918 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bcfd5457-45d1-48e8-ab9b-a02effca276a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:32:13.198950 kubelet[2118]: E1213 02:32:13.198932 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bcfd5457-45d1-48e8-ab9b-a02effca276a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7755b4b488-k842l" podUID="bcfd5457-45d1-48e8-ab9b-a02effca276a" Dec 13 02:32:13.202831 env[1256]: time="2024-12-13T02:32:13.202805392Z" level=error msg="StopPodSandbox for \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\" failed" error="failed to destroy network for sandbox \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:13.202906 kubelet[2118]: E1213 02:32:13.202888 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Dec 13 02:32:13.202942 kubelet[2118]: E1213 02:32:13.202908 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108"} Dec 13 02:32:13.202942 kubelet[2118]: E1213 02:32:13.202925 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"47c64936-f63c-409a-acf6-791447c02a65\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:32:13.202942 kubelet[2118]: E1213 02:32:13.202937 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"47c64936-f63c-409a-acf6-791447c02a65\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7z7tl" podUID="47c64936-f63c-409a-acf6-791447c02a65" Dec 13 02:32:14.167429 env[1256]: time="2024-12-13T02:32:14.166796507Z" level=info msg="StopPodSandbox for \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\"" Dec 13 02:32:14.186807 env[1256]: time="2024-12-13T02:32:14.186749953Z" level=error msg="StopPodSandbox for \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\" failed" error="failed to destroy network for sandbox \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:14.186907 kubelet[2118]: E1213 02:32:14.186881 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Dec 13 02:32:14.186964 kubelet[2118]: E1213 02:32:14.186910 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8"} Dec 13 02:32:14.186964 kubelet[2118]: E1213 02:32:14.186932 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"317605d2-93ce-4fec-922f-d14e17bc8373\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:32:14.187038 kubelet[2118]: E1213 02:32:14.186947 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"317605d2-93ce-4fec-922f-d14e17bc8373\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-tq85l" podUID="317605d2-93ce-4fec-922f-d14e17bc8373" Dec 13 02:32:19.166726 env[1256]: time="2024-12-13T02:32:19.166691968Z" level=info msg="StopPodSandbox for \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\"" Dec 13 02:32:19.185421 env[1256]: time="2024-12-13T02:32:19.185378982Z" level=error msg="StopPodSandbox for \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\" failed" error="failed to destroy network for sandbox \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:19.185562 kubelet[2118]: E1213 02:32:19.185526 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Dec 13 02:32:19.185726 kubelet[2118]: E1213 02:32:19.185571 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d"} Dec 13 02:32:19.185726 kubelet[2118]: E1213 02:32:19.185592 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b15320b7-471e-4e9e-a144-a40693bd62f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:32:19.185726 kubelet[2118]: E1213 02:32:19.185606 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b15320b7-471e-4e9e-a144-a40693bd62f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-r886t" podUID="b15320b7-471e-4e9e-a144-a40693bd62f6" Dec 13 02:32:21.790853 env[1256]: time="2024-12-13T02:32:21.790826747Z" level=info msg="StopPodSandbox for \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\"" Dec 13 02:32:21.791186 env[1256]: time="2024-12-13T02:32:21.791157775Z" level=info msg="Container to stop \"fed5ac2366209c8b411d94cf04d17176286485cca50627d7a53151b1551c2d6d\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 02:32:21.791266 env[1256]: time="2024-12-13T02:32:21.791253718Z" level=info msg="Container to stop \"328e1db5e822de702988a6894b68701d6c968bd449e9981564f73ddc7df65c4b\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 02:32:21.791331 env[1256]: time="2024-12-13T02:32:21.791313502Z" level=info msg="Container to stop \"dee4d3d4f7d7c6b4e91a605c41ed2d90e12dd8274ad7a7379349675628c95b00\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 02:32:21.792823 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1-shm.mount: Deactivated successfully. Dec 13 02:32:21.798000 audit: BPF prog-id=122 op=UNLOAD Dec 13 02:32:21.799906 systemd[1]: cri-containerd-77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1.scope: Deactivated successfully. Dec 13 02:32:21.800736 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 02:32:21.800787 kernel: audit: type=1334 audit(1734057141.798:1048): prog-id=122 op=UNLOAD Dec 13 02:32:21.803000 audit: BPF prog-id=125 op=UNLOAD Dec 13 02:32:21.806188 kernel: audit: type=1334 audit(1734057141.803:1049): prog-id=125 op=UNLOAD Dec 13 02:32:21.816827 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1-rootfs.mount: Deactivated successfully. Dec 13 02:32:21.821058 env[1256]: time="2024-12-13T02:32:21.821017497Z" level=info msg="shim disconnected" id=77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1 Dec 13 02:32:21.821472 env[1256]: time="2024-12-13T02:32:21.821458811Z" level=warning msg="cleaning up after shim disconnected" id=77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1 namespace=k8s.io Dec 13 02:32:21.821536 env[1256]: time="2024-12-13T02:32:21.821525235Z" level=info msg="cleaning up dead shim" Dec 13 02:32:21.828341 env[1256]: time="2024-12-13T02:32:21.828314856Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:32:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3763 runtime=io.containerd.runc.v2\n" Dec 13 02:32:21.828869 env[1256]: time="2024-12-13T02:32:21.828850924Z" level=info msg="TearDown network for sandbox \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\" successfully" Dec 13 02:32:21.828934 env[1256]: time="2024-12-13T02:32:21.828921083Z" level=info msg="StopPodSandbox for \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\" returns successfully" Dec 13 02:32:21.862123 kubelet[2118]: E1213 02:32:21.862100 2118 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" containerName="calico-node" Dec 13 02:32:21.862797 kubelet[2118]: E1213 02:32:21.862437 2118 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" containerName="calico-node" Dec 13 02:32:21.862797 kubelet[2118]: E1213 02:32:21.862448 2118 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" containerName="flexvol-driver" Dec 13 02:32:21.862797 kubelet[2118]: E1213 02:32:21.862453 2118 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" containerName="install-cni" Dec 13 02:32:21.862797 kubelet[2118]: I1213 02:32:21.862482 2118 memory_manager.go:354] "RemoveStaleState removing state" podUID="d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" containerName="calico-node" Dec 13 02:32:21.862797 kubelet[2118]: I1213 02:32:21.862486 2118 memory_manager.go:354] "RemoveStaleState removing state" podUID="d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" containerName="calico-node" Dec 13 02:32:21.862797 kubelet[2118]: E1213 02:32:21.862502 2118 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" containerName="calico-node" Dec 13 02:32:21.862797 kubelet[2118]: I1213 02:32:21.862515 2118 memory_manager.go:354] "RemoveStaleState removing state" podUID="d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" containerName="calico-node" Dec 13 02:32:21.865849 systemd[1]: Created slice kubepods-besteffort-poddab6defc_1a16_4b42_995d_62902d044c4b.slice. Dec 13 02:32:21.934273 kubelet[2118]: I1213 02:32:21.934248 2118 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-8trc8\" (UniqueName: \"kubernetes.io/projected/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-kube-api-access-8trc8\") pod \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " Dec 13 02:32:21.934451 kubelet[2118]: I1213 02:32:21.934438 2118 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-xtables-lock\") pod \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " Dec 13 02:32:21.934542 kubelet[2118]: I1213 02:32:21.934530 2118 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-tigera-ca-bundle\") pod \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " Dec 13 02:32:21.934627 kubelet[2118]: I1213 02:32:21.934610 2118 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-node-certs\") pod \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " Dec 13 02:32:21.934697 kubelet[2118]: I1213 02:32:21.934687 2118 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-policysync\") pod \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " Dec 13 02:32:21.934764 kubelet[2118]: I1213 02:32:21.934755 2118 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-cni-log-dir\") pod \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " Dec 13 02:32:21.934825 kubelet[2118]: I1213 02:32:21.934817 2118 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-var-run-calico\") pod \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " Dec 13 02:32:21.934898 kubelet[2118]: I1213 02:32:21.934886 2118 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-lib-modules\") pod \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " Dec 13 02:32:21.934971 kubelet[2118]: I1213 02:32:21.934960 2118 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-var-lib-calico\") pod \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " Dec 13 02:32:21.935044 kubelet[2118]: I1213 02:32:21.935033 2118 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-flexvol-driver-host\") pod \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " Dec 13 02:32:21.935108 kubelet[2118]: I1213 02:32:21.935099 2118 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-cni-bin-dir\") pod \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " Dec 13 02:32:21.935195 kubelet[2118]: I1213 02:32:21.935182 2118 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-cni-net-dir\") pod \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\" (UID: \"d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa\") " Dec 13 02:32:21.937610 kubelet[2118]: I1213 02:32:21.935691 2118 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" (UID: "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:32:21.937680 kubelet[2118]: I1213 02:32:21.935296 2118 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" (UID: "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:32:21.949075 systemd[1]: var-lib-kubelet-pods-d6c7e93e\x2da9ab\x2d40ed\x2da3a2\x2d6d88d4af24aa-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d8trc8.mount: Deactivated successfully. Dec 13 02:32:21.950596 kubelet[2118]: I1213 02:32:21.950571 2118 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-kube-api-access-8trc8" (OuterVolumeSpecName: "kube-api-access-8trc8") pod "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" (UID: "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa"). InnerVolumeSpecName "kube-api-access-8trc8". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 02:32:21.951018 kubelet[2118]: I1213 02:32:21.950857 2118 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" (UID: "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:32:21.951244 kubelet[2118]: I1213 02:32:21.951210 2118 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" (UID: "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:32:21.951244 kubelet[2118]: I1213 02:32:21.951232 2118 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" (UID: "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:32:21.951312 kubelet[2118]: I1213 02:32:21.951250 2118 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" (UID: "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:32:21.951312 kubelet[2118]: I1213 02:32:21.951264 2118 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" (UID: "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:32:21.951312 kubelet[2118]: I1213 02:32:21.951277 2118 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-policysync" (OuterVolumeSpecName: "policysync") pod "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" (UID: "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:32:21.951312 kubelet[2118]: I1213 02:32:21.951289 2118 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" (UID: "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 02:32:21.953015 systemd[1]: var-lib-kubelet-pods-d6c7e93e\x2da9ab\x2d40ed\x2da3a2\x2d6d88d4af24aa-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. Dec 13 02:32:21.955523 kubelet[2118]: I1213 02:32:21.955498 2118 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" (UID: "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 02:32:21.957900 systemd[1]: var-lib-kubelet-pods-d6c7e93e\x2da9ab\x2d40ed\x2da3a2\x2d6d88d4af24aa-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Dec 13 02:32:21.959098 kubelet[2118]: I1213 02:32:21.959076 2118 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-node-certs" (OuterVolumeSpecName: "node-certs") pod "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" (UID: "d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 02:32:22.036388 kubelet[2118]: I1213 02:32:22.036357 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/dab6defc-1a16-4b42-995d-62902d044c4b-node-certs\") pod \"calico-node-sqp66\" (UID: \"dab6defc-1a16-4b42-995d-62902d044c4b\") " pod="calico-system/calico-node-sqp66" Dec 13 02:32:22.036388 kubelet[2118]: I1213 02:32:22.036390 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/dab6defc-1a16-4b42-995d-62902d044c4b-cni-log-dir\") pod \"calico-node-sqp66\" (UID: \"dab6defc-1a16-4b42-995d-62902d044c4b\") " pod="calico-system/calico-node-sqp66" Dec 13 02:32:22.036554 kubelet[2118]: I1213 02:32:22.036404 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/dab6defc-1a16-4b42-995d-62902d044c4b-flexvol-driver-host\") pod \"calico-node-sqp66\" (UID: \"dab6defc-1a16-4b42-995d-62902d044c4b\") " pod="calico-system/calico-node-sqp66" Dec 13 02:32:22.036554 kubelet[2118]: I1213 02:32:22.036419 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dab6defc-1a16-4b42-995d-62902d044c4b-lib-modules\") pod \"calico-node-sqp66\" (UID: \"dab6defc-1a16-4b42-995d-62902d044c4b\") " pod="calico-system/calico-node-sqp66" Dec 13 02:32:22.036554 kubelet[2118]: I1213 02:32:22.036430 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/dab6defc-1a16-4b42-995d-62902d044c4b-cni-net-dir\") pod \"calico-node-sqp66\" (UID: \"dab6defc-1a16-4b42-995d-62902d044c4b\") " pod="calico-system/calico-node-sqp66" Dec 13 02:32:22.036554 kubelet[2118]: I1213 02:32:22.036443 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bdtxk\" (UniqueName: \"kubernetes.io/projected/dab6defc-1a16-4b42-995d-62902d044c4b-kube-api-access-bdtxk\") pod \"calico-node-sqp66\" (UID: \"dab6defc-1a16-4b42-995d-62902d044c4b\") " pod="calico-system/calico-node-sqp66" Dec 13 02:32:22.036554 kubelet[2118]: I1213 02:32:22.036457 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/dab6defc-1a16-4b42-995d-62902d044c4b-var-lib-calico\") pod \"calico-node-sqp66\" (UID: \"dab6defc-1a16-4b42-995d-62902d044c4b\") " pod="calico-system/calico-node-sqp66" Dec 13 02:32:22.036691 kubelet[2118]: I1213 02:32:22.036470 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dab6defc-1a16-4b42-995d-62902d044c4b-xtables-lock\") pod \"calico-node-sqp66\" (UID: \"dab6defc-1a16-4b42-995d-62902d044c4b\") " pod="calico-system/calico-node-sqp66" Dec 13 02:32:22.036691 kubelet[2118]: I1213 02:32:22.036481 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/dab6defc-1a16-4b42-995d-62902d044c4b-var-run-calico\") pod \"calico-node-sqp66\" (UID: \"dab6defc-1a16-4b42-995d-62902d044c4b\") " pod="calico-system/calico-node-sqp66" Dec 13 02:32:22.036691 kubelet[2118]: I1213 02:32:22.036492 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/dab6defc-1a16-4b42-995d-62902d044c4b-policysync\") pod \"calico-node-sqp66\" (UID: \"dab6defc-1a16-4b42-995d-62902d044c4b\") " pod="calico-system/calico-node-sqp66" Dec 13 02:32:22.036691 kubelet[2118]: I1213 02:32:22.036506 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dab6defc-1a16-4b42-995d-62902d044c4b-tigera-ca-bundle\") pod \"calico-node-sqp66\" (UID: \"dab6defc-1a16-4b42-995d-62902d044c4b\") " pod="calico-system/calico-node-sqp66" Dec 13 02:32:22.036691 kubelet[2118]: I1213 02:32:22.036519 2118 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/dab6defc-1a16-4b42-995d-62902d044c4b-cni-bin-dir\") pod \"calico-node-sqp66\" (UID: \"dab6defc-1a16-4b42-995d-62902d044c4b\") " pod="calico-system/calico-node-sqp66" Dec 13 02:32:22.036691 kubelet[2118]: I1213 02:32:22.036535 2118 reconciler_common.go:288] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-lib-modules\") on node \"localhost\" DevicePath \"\"" Dec 13 02:32:22.036850 kubelet[2118]: I1213 02:32:22.036543 2118 reconciler_common.go:288] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-var-lib-calico\") on node \"localhost\" DevicePath \"\"" Dec 13 02:32:22.036850 kubelet[2118]: I1213 02:32:22.036550 2118 reconciler_common.go:288] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-flexvol-driver-host\") on node \"localhost\" DevicePath \"\"" Dec 13 02:32:22.036850 kubelet[2118]: I1213 02:32:22.036558 2118 reconciler_common.go:288] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-cni-bin-dir\") on node \"localhost\" DevicePath \"\"" Dec 13 02:32:22.036850 kubelet[2118]: I1213 02:32:22.036565 2118 reconciler_common.go:288] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-cni-net-dir\") on node \"localhost\" DevicePath \"\"" Dec 13 02:32:22.036850 kubelet[2118]: I1213 02:32:22.036571 2118 reconciler_common.go:288] "Volume detached for volume \"kube-api-access-8trc8\" (UniqueName: \"kubernetes.io/projected/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-kube-api-access-8trc8\") on node \"localhost\" DevicePath \"\"" Dec 13 02:32:22.036850 kubelet[2118]: I1213 02:32:22.036578 2118 reconciler_common.go:288] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" Dec 13 02:32:22.036850 kubelet[2118]: I1213 02:32:22.036593 2118 reconciler_common.go:288] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-node-certs\") on node \"localhost\" DevicePath \"\"" Dec 13 02:32:22.036850 kubelet[2118]: I1213 02:32:22.036600 2118 reconciler_common.go:288] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-xtables-lock\") on node \"localhost\" DevicePath \"\"" Dec 13 02:32:22.037048 kubelet[2118]: I1213 02:32:22.036606 2118 reconciler_common.go:288] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-policysync\") on node \"localhost\" DevicePath \"\"" Dec 13 02:32:22.037048 kubelet[2118]: I1213 02:32:22.036613 2118 reconciler_common.go:288] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-cni-log-dir\") on node \"localhost\" DevicePath \"\"" Dec 13 02:32:22.037048 kubelet[2118]: I1213 02:32:22.036620 2118 reconciler_common.go:288] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa-var-run-calico\") on node \"localhost\" DevicePath \"\"" Dec 13 02:32:22.167985 env[1256]: time="2024-12-13T02:32:22.167902772Z" level=info msg="StopPodSandbox for \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\"" Dec 13 02:32:22.168506 env[1256]: time="2024-12-13T02:32:22.168432182Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-sqp66,Uid:dab6defc-1a16-4b42-995d-62902d044c4b,Namespace:calico-system,Attempt:0,}" Dec 13 02:32:22.182039 systemd[1]: Removed slice kubepods-besteffort-podd6c7e93e_a9ab_40ed_a3a2_6d88d4af24aa.slice. Dec 13 02:32:22.185394 env[1256]: time="2024-12-13T02:32:22.185330123Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:32:22.186230 env[1256]: time="2024-12-13T02:32:22.185374586Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:32:22.186230 env[1256]: time="2024-12-13T02:32:22.185385820Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:32:22.186230 env[1256]: time="2024-12-13T02:32:22.185524795Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/606a83b7914e07bc35308c7808a187c42e2b9084e7c668c7b93589018a4454dc pid=3799 runtime=io.containerd.runc.v2 Dec 13 02:32:22.202895 systemd[1]: Started cri-containerd-606a83b7914e07bc35308c7808a187c42e2b9084e7c668c7b93589018a4454dc.scope. Dec 13 02:32:22.204911 env[1256]: time="2024-12-13T02:32:22.204885098Z" level=error msg="StopPodSandbox for \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\" failed" error="failed to destroy network for sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:22.205105 kubelet[2118]: E1213 02:32:22.205079 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Dec 13 02:32:22.205149 kubelet[2118]: E1213 02:32:22.205107 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8"} Dec 13 02:32:22.205149 kubelet[2118]: E1213 02:32:22.205128 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:32:22.205149 kubelet[2118]: E1213 02:32:22.205141 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-xkmf7" podUID="b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7" Dec 13 02:32:22.216224 kernel: audit: type=1400 audit(1734057142.210:1050): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.216313 kernel: audit: type=1400 audit(1734057142.210:1051): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.216333 kernel: audit: type=1400 audit(1734057142.210:1052): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.221477 kernel: audit: type=1400 audit(1734057142.210:1053): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.221520 kernel: audit: type=1400 audit(1734057142.210:1054): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.226607 kernel: audit: type=1400 audit(1734057142.210:1055): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.229432 kernel: audit: type=1400 audit(1734057142.210:1056): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.236224 kernel: audit: type=1400 audit(1734057142.210:1057): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.215000 audit: BPF prog-id=145 op=LOAD Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3799 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:22.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630366138336237393134653037626333353330386337383038613138 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3799 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:22.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630366138336237393134653037626333353330386337383038613138 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit: BPF prog-id=146 op=LOAD Dec 13 02:32:22.217000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024e50 items=0 ppid=3799 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:22.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630366138336237393134653037626333353330386337383038613138 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit: BPF prog-id=147 op=LOAD Dec 13 02:32:22.217000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024e98 items=0 ppid=3799 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:22.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630366138336237393134653037626333353330386337383038613138 Dec 13 02:32:22.217000 audit: BPF prog-id=147 op=UNLOAD Dec 13 02:32:22.217000 audit: BPF prog-id=146 op=UNLOAD Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { perfmon } for pid=3813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit[3813]: AVC avc: denied { bpf } for pid=3813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.217000 audit: BPF prog-id=148 op=LOAD Dec 13 02:32:22.217000 audit[3813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000252a8 items=0 ppid=3799 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:22.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630366138336237393134653037626333353330386337383038613138 Dec 13 02:32:22.239499 env[1256]: time="2024-12-13T02:32:22.239474143Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-sqp66,Uid:dab6defc-1a16-4b42-995d-62902d044c4b,Namespace:calico-system,Attempt:0,} returns sandbox id \"606a83b7914e07bc35308c7808a187c42e2b9084e7c668c7b93589018a4454dc\"" Dec 13 02:32:22.243465 env[1256]: time="2024-12-13T02:32:22.243080815Z" level=info msg="CreateContainer within sandbox \"606a83b7914e07bc35308c7808a187c42e2b9084e7c668c7b93589018a4454dc\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:32:22.251372 env[1256]: time="2024-12-13T02:32:22.251347179Z" level=info msg="CreateContainer within sandbox \"606a83b7914e07bc35308c7808a187c42e2b9084e7c668c7b93589018a4454dc\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"2480c9467f9468c97ef0feb9683bdec946e80db01fa58d767f513cc72e68019f\"" Dec 13 02:32:22.255380 env[1256]: time="2024-12-13T02:32:22.252754194Z" level=info msg="StartContainer for \"2480c9467f9468c97ef0feb9683bdec946e80db01fa58d767f513cc72e68019f\"" Dec 13 02:32:22.269291 systemd[1]: Started cri-containerd-2480c9467f9468c97ef0feb9683bdec946e80db01fa58d767f513cc72e68019f.scope. Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit[3850]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f593834f018 items=0 ppid=3799 pid=3850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:22.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234383063393436376639343638633937656630666562393638336264 Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit: BPF prog-id=149 op=LOAD Dec 13 02:32:22.290000 audit[3850]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000302e78 items=0 ppid=3799 pid=3850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:22.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234383063393436376639343638633937656630666562393638336264 Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.290000 audit: BPF prog-id=150 op=LOAD Dec 13 02:32:22.290000 audit[3850]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000302ec8 items=0 ppid=3799 pid=3850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:22.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234383063393436376639343638633937656630666562393638336264 Dec 13 02:32:22.291000 audit: BPF prog-id=150 op=UNLOAD Dec 13 02:32:22.291000 audit: BPF prog-id=149 op=UNLOAD Dec 13 02:32:22.291000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.291000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.291000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.291000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.291000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.291000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.291000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.291000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.291000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.291000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.291000 audit: BPF prog-id=151 op=LOAD Dec 13 02:32:22.291000 audit[3850]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000302f58 items=0 ppid=3799 pid=3850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:22.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234383063393436376639343638633937656630666562393638336264 Dec 13 02:32:22.300334 env[1256]: time="2024-12-13T02:32:22.300311156Z" level=info msg="StartContainer for \"2480c9467f9468c97ef0feb9683bdec946e80db01fa58d767f513cc72e68019f\" returns successfully" Dec 13 02:32:22.360915 systemd[1]: cri-containerd-2480c9467f9468c97ef0feb9683bdec946e80db01fa58d767f513cc72e68019f.scope: Deactivated successfully. Dec 13 02:32:22.363000 audit: BPF prog-id=151 op=UNLOAD Dec 13 02:32:22.433796 env[1256]: time="2024-12-13T02:32:22.431740511Z" level=info msg="shim disconnected" id=2480c9467f9468c97ef0feb9683bdec946e80db01fa58d767f513cc72e68019f Dec 13 02:32:22.434037 env[1256]: time="2024-12-13T02:32:22.434016900Z" level=warning msg="cleaning up after shim disconnected" id=2480c9467f9468c97ef0feb9683bdec946e80db01fa58d767f513cc72e68019f namespace=k8s.io Dec 13 02:32:22.434096 env[1256]: time="2024-12-13T02:32:22.434085076Z" level=info msg="cleaning up dead shim" Dec 13 02:32:22.438774 env[1256]: time="2024-12-13T02:32:22.438747454Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:32:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3888 runtime=io.containerd.runc.v2\ntime=\"2024-12-13T02:32:22Z\" level=warning msg=\"failed to remove runc container\" error=\"runc did not terminate successfully: exit status 255: \" runtime=io.containerd.runc.v2\n" Dec 13 02:32:22.483755 kubelet[2118]: I1213 02:32:22.482343 2118 scope.go:117] "RemoveContainer" containerID="fed5ac2366209c8b411d94cf04d17176286485cca50627d7a53151b1551c2d6d" Dec 13 02:32:22.486403 env[1256]: time="2024-12-13T02:32:22.486361726Z" level=info msg="RemoveContainer for \"fed5ac2366209c8b411d94cf04d17176286485cca50627d7a53151b1551c2d6d\"" Dec 13 02:32:22.489983 env[1256]: time="2024-12-13T02:32:22.489938376Z" level=info msg="CreateContainer within sandbox \"606a83b7914e07bc35308c7808a187c42e2b9084e7c668c7b93589018a4454dc\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:32:22.493657 env[1256]: time="2024-12-13T02:32:22.493403227Z" level=info msg="RemoveContainer for \"fed5ac2366209c8b411d94cf04d17176286485cca50627d7a53151b1551c2d6d\" returns successfully" Dec 13 02:32:22.495220 kubelet[2118]: I1213 02:32:22.493966 2118 scope.go:117] "RemoveContainer" containerID="328e1db5e822de702988a6894b68701d6c968bd449e9981564f73ddc7df65c4b" Dec 13 02:32:22.502016 env[1256]: time="2024-12-13T02:32:22.499884792Z" level=info msg="RemoveContainer for \"328e1db5e822de702988a6894b68701d6c968bd449e9981564f73ddc7df65c4b\"" Dec 13 02:32:22.504434 env[1256]: time="2024-12-13T02:32:22.504408198Z" level=info msg="CreateContainer within sandbox \"606a83b7914e07bc35308c7808a187c42e2b9084e7c668c7b93589018a4454dc\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"42b9046e9c70c4736f222ceb5391d96a4a365b32528f3394af4724f49b2c5dd2\"" Dec 13 02:32:22.505260 env[1256]: time="2024-12-13T02:32:22.505224491Z" level=info msg="StartContainer for \"42b9046e9c70c4736f222ceb5391d96a4a365b32528f3394af4724f49b2c5dd2\"" Dec 13 02:32:22.507469 env[1256]: time="2024-12-13T02:32:22.507445994Z" level=info msg="RemoveContainer for \"328e1db5e822de702988a6894b68701d6c968bd449e9981564f73ddc7df65c4b\" returns successfully" Dec 13 02:32:22.507598 kubelet[2118]: I1213 02:32:22.507577 2118 scope.go:117] "RemoveContainer" containerID="dee4d3d4f7d7c6b4e91a605c41ed2d90e12dd8274ad7a7379349675628c95b00" Dec 13 02:32:22.509996 env[1256]: time="2024-12-13T02:32:22.509950335Z" level=info msg="RemoveContainer for \"dee4d3d4f7d7c6b4e91a605c41ed2d90e12dd8274ad7a7379349675628c95b00\"" Dec 13 02:32:22.511689 env[1256]: time="2024-12-13T02:32:22.511671023Z" level=info msg="RemoveContainer for \"dee4d3d4f7d7c6b4e91a605c41ed2d90e12dd8274ad7a7379349675628c95b00\" returns successfully" Dec 13 02:32:22.529560 systemd[1]: Started cri-containerd-42b9046e9c70c4736f222ceb5391d96a4a365b32528f3394af4724f49b2c5dd2.scope. Dec 13 02:32:22.590000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.590000 audit[3907]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fbdb8361488 items=0 ppid=3799 pid=3907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:22.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432623930343665396337306334373336663232326365623533393164 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit: BPF prog-id=152 op=LOAD Dec 13 02:32:22.591000 audit[3907]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00038c838 items=0 ppid=3799 pid=3907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:22.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432623930343665396337306334373336663232326365623533393164 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit: BPF prog-id=153 op=LOAD Dec 13 02:32:22.591000 audit[3907]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00038c888 items=0 ppid=3799 pid=3907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:22.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432623930343665396337306334373336663232326365623533393164 Dec 13 02:32:22.591000 audit: BPF prog-id=153 op=UNLOAD Dec 13 02:32:22.591000 audit: BPF prog-id=152 op=UNLOAD Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { perfmon } for pid=3907 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit[3907]: AVC avc: denied { bpf } for pid=3907 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:22.591000 audit: BPF prog-id=154 op=LOAD Dec 13 02:32:22.591000 audit[3907]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00038c918 items=0 ppid=3799 pid=3907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:22.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432623930343665396337306334373336663232326365623533393164 Dec 13 02:32:22.619969 env[1256]: time="2024-12-13T02:32:22.619562853Z" level=info msg="StartContainer for \"42b9046e9c70c4736f222ceb5391d96a4a365b32528f3394af4724f49b2c5dd2\" returns successfully" Dec 13 02:32:24.178632 kubelet[2118]: I1213 02:32:24.178596 2118 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa" path="/var/lib/kubelet/pods/d6c7e93e-a9ab-40ed-a3a2-6d88d4af24aa/volumes" Dec 13 02:32:24.501547 env[1256]: time="2024-12-13T02:32:24.501503230Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: failed to load CNI config list file /etc/cni/net.d/10-calico.conflist: error parsing configuration list: unexpected end of JSON input: invalid cni config: failed to load cni config" Dec 13 02:32:24.501841 env[1256]: time="2024-12-13T02:32:24.501578739Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: failed to load CNI config list file /etc/cni/net.d/10-calico.conflist: error parsing configuration list: unexpected end of JSON input: invalid cni config: failed to load cni config" Dec 13 02:32:24.503228 systemd[1]: cri-containerd-42b9046e9c70c4736f222ceb5391d96a4a365b32528f3394af4724f49b2c5dd2.scope: Deactivated successfully. Dec 13 02:32:24.507000 audit: BPF prog-id=154 op=UNLOAD Dec 13 02:32:24.517783 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-42b9046e9c70c4736f222ceb5391d96a4a365b32528f3394af4724f49b2c5dd2-rootfs.mount: Deactivated successfully. Dec 13 02:32:24.524354 env[1256]: time="2024-12-13T02:32:24.524327972Z" level=info msg="shim disconnected" id=42b9046e9c70c4736f222ceb5391d96a4a365b32528f3394af4724f49b2c5dd2 Dec 13 02:32:24.524465 env[1256]: time="2024-12-13T02:32:24.524452731Z" level=warning msg="cleaning up after shim disconnected" id=42b9046e9c70c4736f222ceb5391d96a4a365b32528f3394af4724f49b2c5dd2 namespace=k8s.io Dec 13 02:32:24.524518 env[1256]: time="2024-12-13T02:32:24.524507759Z" level=info msg="cleaning up dead shim" Dec 13 02:32:24.529391 env[1256]: time="2024-12-13T02:32:24.529369460Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:32:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3952 runtime=io.containerd.runc.v2\n" Dec 13 02:32:25.167024 env[1256]: time="2024-12-13T02:32:25.166996243Z" level=info msg="StopPodSandbox for \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\"" Dec 13 02:32:25.199132 env[1256]: time="2024-12-13T02:32:25.199089825Z" level=error msg="StopPodSandbox for \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\" failed" error="failed to destroy network for sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:32:25.199480 kubelet[2118]: E1213 02:32:25.199362 2118 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Dec 13 02:32:25.199480 kubelet[2118]: E1213 02:32:25.199401 2118 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994"} Dec 13 02:32:25.199480 kubelet[2118]: E1213 02:32:25.199435 2118 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0b579c6e-3d61-42ac-9ad3-a083377b25bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:32:25.199480 kubelet[2118]: E1213 02:32:25.199454 2118 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0b579c6e-3d61-42ac-9ad3-a083377b25bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-9s8w5" podUID="0b579c6e-3d61-42ac-9ad3-a083377b25bd" Dec 13 02:32:25.516332 env[1256]: time="2024-12-13T02:32:25.516304361Z" level=info msg="CreateContainer within sandbox \"606a83b7914e07bc35308c7808a187c42e2b9084e7c668c7b93589018a4454dc\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:32:25.522394 env[1256]: time="2024-12-13T02:32:25.522370836Z" level=info msg="CreateContainer within sandbox \"606a83b7914e07bc35308c7808a187c42e2b9084e7c668c7b93589018a4454dc\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7171a5edbbc375e7652eff3c52e4f402fd7be2d4a7d6c45d439806b202cb4155\"" Dec 13 02:32:25.523825 env[1256]: time="2024-12-13T02:32:25.523044555Z" level=info msg="StartContainer for \"7171a5edbbc375e7652eff3c52e4f402fd7be2d4a7d6c45d439806b202cb4155\"" Dec 13 02:32:25.539277 systemd[1]: Started cri-containerd-7171a5edbbc375e7652eff3c52e4f402fd7be2d4a7d6c45d439806b202cb4155.scope. Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7f87a496d198 items=0 ppid=3799 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:25.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731373161356564626263333735653736353265666633633532653466 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit: BPF prog-id=155 op=LOAD Dec 13 02:32:25.554000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c0002cdc88 items=0 ppid=3799 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:25.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731373161356564626263333735653736353265666633633532653466 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit: BPF prog-id=156 op=LOAD Dec 13 02:32:25.554000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c0002cdcd8 items=0 ppid=3799 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:25.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731373161356564626263333735653736353265666633633532653466 Dec 13 02:32:25.554000 audit: BPF prog-id=156 op=UNLOAD Dec 13 02:32:25.554000 audit: BPF prog-id=155 op=UNLOAD Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:25.554000 audit: BPF prog-id=157 op=LOAD Dec 13 02:32:25.554000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c0002cdd68 items=0 ppid=3799 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:25.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731373161356564626263333735653736353265666633633532653466 Dec 13 02:32:25.568143 env[1256]: time="2024-12-13T02:32:25.568107473Z" level=info msg="StartContainer for \"7171a5edbbc375e7652eff3c52e4f402fd7be2d4a7d6c45d439806b202cb4155\" returns successfully" Dec 13 02:32:26.166896 env[1256]: time="2024-12-13T02:32:26.166870472Z" level=info msg="StopPodSandbox for \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\"" Dec 13 02:32:26.247458 env[1256]: 2024-12-13 02:32:26.210 [INFO][4054] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Dec 13 02:32:26.247458 env[1256]: 2024-12-13 02:32:26.210 [INFO][4054] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" iface="eth0" netns="/var/run/netns/cni-3d43c7ba-7c90-f96d-8c06-f16aab988d98" Dec 13 02:32:26.247458 env[1256]: 2024-12-13 02:32:26.210 [INFO][4054] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" iface="eth0" netns="/var/run/netns/cni-3d43c7ba-7c90-f96d-8c06-f16aab988d98" Dec 13 02:32:26.247458 env[1256]: 2024-12-13 02:32:26.210 [INFO][4054] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" iface="eth0" netns="/var/run/netns/cni-3d43c7ba-7c90-f96d-8c06-f16aab988d98" Dec 13 02:32:26.247458 env[1256]: 2024-12-13 02:32:26.210 [INFO][4054] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Dec 13 02:32:26.247458 env[1256]: 2024-12-13 02:32:26.210 [INFO][4054] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Dec 13 02:32:26.247458 env[1256]: 2024-12-13 02:32:26.236 [INFO][4060] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" HandleID="k8s-pod-network.492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Workload="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0" Dec 13 02:32:26.247458 env[1256]: 2024-12-13 02:32:26.237 [INFO][4060] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:32:26.247458 env[1256]: 2024-12-13 02:32:26.237 [INFO][4060] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:32:26.247458 env[1256]: 2024-12-13 02:32:26.244 [WARNING][4060] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" HandleID="k8s-pod-network.492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Workload="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0" Dec 13 02:32:26.247458 env[1256]: 2024-12-13 02:32:26.244 [INFO][4060] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" HandleID="k8s-pod-network.492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Workload="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0" Dec 13 02:32:26.247458 env[1256]: 2024-12-13 02:32:26.245 [INFO][4060] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:32:26.247458 env[1256]: 2024-12-13 02:32:26.246 [INFO][4054] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Dec 13 02:32:26.248565 env[1256]: time="2024-12-13T02:32:26.247567814Z" level=info msg="TearDown network for sandbox \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\" successfully" Dec 13 02:32:26.248565 env[1256]: time="2024-12-13T02:32:26.247590638Z" level=info msg="StopPodSandbox for \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\" returns successfully" Dec 13 02:32:26.248565 env[1256]: time="2024-12-13T02:32:26.248030904Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7755b4b488-k842l,Uid:bcfd5457-45d1-48e8-ab9b-a02effca276a,Namespace:calico-system,Attempt:1,}" Dec 13 02:32:26.336389 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:32:26.336462 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califdeaec08be0: link becomes ready Dec 13 02:32:26.338977 systemd-networkd[1062]: califdeaec08be0: Link UP Dec 13 02:32:26.339160 systemd-networkd[1062]: califdeaec08be0: Gained carrier Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.266 [INFO][4066] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.279 [INFO][4066] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0 calico-kube-controllers-7755b4b488- calico-system bcfd5457-45d1-48e8-ab9b-a02effca276a 871 0 2024-12-13 02:31:21 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7755b4b488 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-7755b4b488-k842l eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] califdeaec08be0 [] []}} ContainerID="aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f" Namespace="calico-system" Pod="calico-kube-controllers-7755b4b488-k842l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-" Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.279 [INFO][4066] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f" Namespace="calico-system" Pod="calico-kube-controllers-7755b4b488-k842l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0" Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.300 [INFO][4078] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f" HandleID="k8s-pod-network.aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f" Workload="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0" Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.305 [INFO][4078] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f" HandleID="k8s-pod-network.aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f" Workload="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000335110), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-7755b4b488-k842l", "timestamp":"2024-12-13 02:32:26.300033667 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.305 [INFO][4078] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.305 [INFO][4078] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.305 [INFO][4078] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.306 [INFO][4078] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f" host="localhost" Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.308 [INFO][4078] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.311 [INFO][4078] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.312 [INFO][4078] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.313 [INFO][4078] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.313 [INFO][4078] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f" host="localhost" Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.313 [INFO][4078] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.316 [INFO][4078] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f" host="localhost" Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.320 [INFO][4078] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f" host="localhost" Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.320 [INFO][4078] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f" host="localhost" Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.320 [INFO][4078] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:32:26.347550 env[1256]: 2024-12-13 02:32:26.320 [INFO][4078] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f" HandleID="k8s-pod-network.aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f" Workload="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0" Dec 13 02:32:26.349036 env[1256]: 2024-12-13 02:32:26.321 [INFO][4066] cni-plugin/k8s.go 386: Populated endpoint ContainerID="aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f" Namespace="calico-system" Pod="calico-kube-controllers-7755b4b488-k842l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0", GenerateName:"calico-kube-controllers-7755b4b488-", Namespace:"calico-system", SelfLink:"", UID:"bcfd5457-45d1-48e8-ab9b-a02effca276a", ResourceVersion:"871", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7755b4b488", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-7755b4b488-k842l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califdeaec08be0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:32:26.349036 env[1256]: 2024-12-13 02:32:26.321 [INFO][4066] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f" Namespace="calico-system" Pod="calico-kube-controllers-7755b4b488-k842l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0" Dec 13 02:32:26.349036 env[1256]: 2024-12-13 02:32:26.321 [INFO][4066] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califdeaec08be0 ContainerID="aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f" Namespace="calico-system" Pod="calico-kube-controllers-7755b4b488-k842l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0" Dec 13 02:32:26.349036 env[1256]: 2024-12-13 02:32:26.336 [INFO][4066] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f" Namespace="calico-system" Pod="calico-kube-controllers-7755b4b488-k842l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0" Dec 13 02:32:26.349036 env[1256]: 2024-12-13 02:32:26.336 [INFO][4066] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f" Namespace="calico-system" Pod="calico-kube-controllers-7755b4b488-k842l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0", GenerateName:"calico-kube-controllers-7755b4b488-", Namespace:"calico-system", SelfLink:"", UID:"bcfd5457-45d1-48e8-ab9b-a02effca276a", ResourceVersion:"871", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7755b4b488", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f", Pod:"calico-kube-controllers-7755b4b488-k842l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califdeaec08be0", MAC:"76:29:43:fb:9b:2f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:32:26.349036 env[1256]: 2024-12-13 02:32:26.345 [INFO][4066] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f" Namespace="calico-system" Pod="calico-kube-controllers-7755b4b488-k842l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0" Dec 13 02:32:26.358093 env[1256]: time="2024-12-13T02:32:26.358029083Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:32:26.358093 env[1256]: time="2024-12-13T02:32:26.358059956Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:32:26.358093 env[1256]: time="2024-12-13T02:32:26.358067763Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:32:26.358367 env[1256]: time="2024-12-13T02:32:26.358341058Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f pid=4105 runtime=io.containerd.runc.v2 Dec 13 02:32:26.371703 systemd[1]: Started cri-containerd-aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f.scope. Dec 13 02:32:26.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit: BPF prog-id=158 op=LOAD Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=4105 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:26.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633635343638323331343563613865386666646539333339323161 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=4105 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:26.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633635343638323331343563613865386666646539333339323161 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit: BPF prog-id=159 op=LOAD Dec 13 02:32:26.388000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c00030c7d0 items=0 ppid=4105 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:26.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633635343638323331343563613865386666646539333339323161 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.388000 audit: BPF prog-id=160 op=LOAD Dec 13 02:32:26.388000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c00030c818 items=0 ppid=4105 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:26.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633635343638323331343563613865386666646539333339323161 Dec 13 02:32:26.388000 audit: BPF prog-id=160 op=UNLOAD Dec 13 02:32:26.389000 audit: BPF prog-id=159 op=UNLOAD Dec 13 02:32:26.389000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.389000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.389000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.389000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.389000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.389000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.389000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.389000 audit[4116]: AVC avc: denied { perfmon } for pid=4116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.389000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.389000 audit[4116]: AVC avc: denied { bpf } for pid=4116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:26.389000 audit: BPF prog-id=161 op=LOAD Dec 13 02:32:26.389000 audit[4116]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c00030cc28 items=0 ppid=4105 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:26.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633635343638323331343563613865386666646539333339323161 Dec 13 02:32:26.390658 systemd-resolved[1204]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:32:26.410519 env[1256]: time="2024-12-13T02:32:26.410484012Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7755b4b488-k842l,Uid:bcfd5457-45d1-48e8-ab9b-a02effca276a,Namespace:calico-system,Attempt:1,} returns sandbox id \"aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f\"" Dec 13 02:32:26.414042 env[1256]: time="2024-12-13T02:32:26.414018324Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 02:32:26.517335 kubelet[2118]: I1213 02:32:26.515435 2118 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-sqp66" podStartSLOduration=5.512580842 podStartE2EDuration="5.512580842s" podCreationTimestamp="2024-12-13 02:32:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:32:26.51163665 +0000 UTC m=+78.490739121" watchObservedRunningTime="2024-12-13 02:32:26.512580842 +0000 UTC m=+78.491683312" Dec 13 02:32:26.521822 systemd[1]: run-containerd-runc-k8s.io-7171a5edbbc375e7652eff3c52e4f402fd7be2d4a7d6c45d439806b202cb4155-runc.8Z412p.mount: Deactivated successfully. Dec 13 02:32:26.521881 systemd[1]: run-netns-cni\x2d3d43c7ba\x2d7c90\x2df96d\x2d8c06\x2df16aab988d98.mount: Deactivated successfully. Dec 13 02:32:26.971033 kernel: kauditd_printk_skb: 237 callbacks suppressed Dec 13 02:32:26.971121 kernel: audit: type=1400 audit(1734057146.966:1106): avc: denied { write } for pid=4217 comm="tee" name="fd" dev="proc" ino=38417 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:32:26.966000 audit[4217]: AVC avc: denied { write } for pid=4217 comm="tee" name="fd" dev="proc" ino=38417 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:32:26.966000 audit[4217]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcae647a30 a2=241 a3=1b6 items=1 ppid=4170 pid=4217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:26.975198 kernel: audit: type=1300 audit(1734057146.966:1106): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcae647a30 a2=241 a3=1b6 items=1 ppid=4170 pid=4217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:26.966000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 02:32:26.980813 kernel: audit: type=1307 audit(1734057146.966:1106): cwd="/etc/service/enabled/cni/log" Dec 13 02:32:26.983249 kernel: audit: type=1302 audit(1734057146.966:1106): item=0 name="/dev/fd/63" inode=38403 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:32:26.983285 kernel: audit: type=1327 audit(1734057146.966:1106): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:32:26.986385 kernel: audit: type=1400 audit(1734057146.967:1107): avc: denied { write } for pid=4230 comm="tee" name="fd" dev="proc" ino=38421 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:32:26.966000 audit: PATH item=0 name="/dev/fd/63" inode=38403 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:32:26.966000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:32:26.967000 audit[4230]: AVC avc: denied { write } for pid=4230 comm="tee" name="fd" dev="proc" ino=38421 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:32:26.967000 audit[4230]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8727ba2e a2=241 a3=1b6 items=1 ppid=4172 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:26.991940 kernel: audit: type=1300 audit(1734057146.967:1107): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8727ba2e a2=241 a3=1b6 items=1 ppid=4172 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:26.992188 kernel: audit: type=1307 audit(1734057146.967:1107): cwd="/etc/service/enabled/bird6/log" Dec 13 02:32:26.967000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 02:32:26.967000 audit: PATH item=0 name="/dev/fd/63" inode=38409 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:32:26.997309 kernel: audit: type=1302 audit(1734057146.967:1107): item=0 name="/dev/fd/63" inode=38409 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:32:26.997344 kernel: audit: type=1327 audit(1734057146.967:1107): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:32:26.967000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:32:26.968000 audit[4215]: AVC avc: denied { write } for pid=4215 comm="tee" name="fd" dev="proc" ino=38427 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:32:26.968000 audit[4215]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd39dcca2e a2=241 a3=1b6 items=1 ppid=4176 pid=4215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:26.968000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 02:32:26.968000 audit: PATH item=0 name="/dev/fd/63" inode=38400 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:32:26.968000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:32:26.970000 audit[4222]: AVC avc: denied { write } for pid=4222 comm="tee" name="fd" dev="proc" ino=38431 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:32:26.970000 audit[4222]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca5884a1f a2=241 a3=1b6 items=1 ppid=4174 pid=4222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:26.970000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 02:32:26.970000 audit: PATH item=0 name="/dev/fd/63" inode=38406 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:32:26.970000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:32:26.970000 audit[4213]: AVC avc: denied { write } for pid=4213 comm="tee" name="fd" dev="proc" ino=38433 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:32:26.970000 audit[4213]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc76895a2f a2=241 a3=1b6 items=1 ppid=4175 pid=4213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:26.970000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 02:32:26.970000 audit: PATH item=0 name="/dev/fd/63" inode=38397 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:32:26.970000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:32:27.014000 audit[4234]: AVC avc: denied { write } for pid=4234 comm="tee" name="fd" dev="proc" ino=37702 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:32:27.014000 audit[4234]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff35c52a2e a2=241 a3=1b6 items=1 ppid=4181 pid=4234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.014000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 02:32:27.014000 audit: PATH item=0 name="/dev/fd/63" inode=37675 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:32:27.014000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:32:27.022000 audit[4246]: AVC avc: denied { write } for pid=4246 comm="tee" name="fd" dev="proc" ino=37709 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:32:27.022000 audit[4246]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffcc1c3a1e a2=241 a3=1b6 items=1 ppid=4178 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.022000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 02:32:27.022000 audit: PATH item=0 name="/dev/fd/63" inode=37698 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:32:27.022000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:32:27.111000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.111000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.111000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.111000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.111000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.111000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.111000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.111000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.111000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.111000 audit: BPF prog-id=162 op=LOAD Dec 13 02:32:27.111000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcfc72f500 a2=98 a3=3 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.111000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.112000 audit: BPF prog-id=162 op=UNLOAD Dec 13 02:32:27.114000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.114000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.114000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.114000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.114000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.114000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.114000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.114000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.114000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.114000 audit: BPF prog-id=163 op=LOAD Dec 13 02:32:27.114000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcfc72f2e0 a2=74 a3=540051 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.114000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.115000 audit: BPF prog-id=163 op=UNLOAD Dec 13 02:32:27.115000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.115000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.115000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.115000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.115000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.115000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.115000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.115000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.115000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.115000 audit: BPF prog-id=164 op=LOAD Dec 13 02:32:27.115000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcfc72f310 a2=94 a3=2 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.115000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.116000 audit: BPF prog-id=164 op=UNLOAD Dec 13 02:32:27.166971 env[1256]: time="2024-12-13T02:32:27.166940761Z" level=info msg="StopPodSandbox for \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\"" Dec 13 02:32:27.200000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.200000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.200000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.200000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.200000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.200000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.200000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.200000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.200000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.200000 audit: BPF prog-id=165 op=LOAD Dec 13 02:32:27.200000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcfc72f1d0 a2=40 a3=1 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.200000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.201000 audit: BPF prog-id=165 op=UNLOAD Dec 13 02:32:27.201000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.201000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcfc72f2a0 a2=50 a3=7ffcfc72f380 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.201000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.211000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.211000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcfc72f1e0 a2=28 a3=0 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.211000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.211000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.211000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfc72f210 a2=28 a3=0 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.211000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.211000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.211000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfc72f120 a2=28 a3=0 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.211000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.211000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.211000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcfc72f230 a2=28 a3=0 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.211000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.211000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.211000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcfc72f210 a2=28 a3=0 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.211000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.211000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.211000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcfc72f200 a2=28 a3=0 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.211000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.211000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.211000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcfc72f230 a2=28 a3=0 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.211000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.211000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.211000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfc72f210 a2=28 a3=0 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.211000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.211000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.211000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfc72f230 a2=28 a3=0 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.211000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.211000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.211000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfc72f200 a2=28 a3=0 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.211000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.211000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.211000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcfc72f270 a2=28 a3=0 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.211000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.212000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.212000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcfc72f020 a2=50 a3=1 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.212000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit: BPF prog-id=166 op=LOAD Dec 13 02:32:27.213000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcfc72f020 a2=94 a3=5 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.213000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.213000 audit: BPF prog-id=166 op=UNLOAD Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcfc72f0d0 a2=50 a3=1 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.213000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcfc72f1f0 a2=4 a3=38 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.213000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { confidentiality } for pid=4269 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:32:27.213000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcfc72f240 a2=94 a3=6 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.213000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { confidentiality } for pid=4269 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:32:27.213000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcfc72e9f0 a2=94 a3=83 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.213000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { perfmon } for pid=4269 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { bpf } for pid=4269 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.213000 audit[4269]: AVC avc: denied { confidentiality } for pid=4269 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:32:27.213000 audit[4269]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcfc72e9f0 a2=94 a3=83 items=0 ppid=4177 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.213000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit: BPF prog-id=167 op=LOAD Dec 13 02:32:27.306000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe67039f20 a2=98 a3=1999999999999999 items=0 ppid=4177 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.306000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:32:27.306000 audit: BPF prog-id=167 op=UNLOAD Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit: BPF prog-id=168 op=LOAD Dec 13 02:32:27.306000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe67039e00 a2=74 a3=ffff items=0 ppid=4177 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.306000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:32:27.306000 audit: BPF prog-id=168 op=UNLOAD Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.306000 audit: BPF prog-id=169 op=LOAD Dec 13 02:32:27.306000 audit[4306]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe67039e40 a2=40 a3=7ffe6703a020 items=0 ppid=4177 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.306000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:32:27.307000 audit: BPF prog-id=169 op=UNLOAD Dec 13 02:32:27.328423 env[1256]: 2024-12-13 02:32:27.220 [INFO][4293] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Dec 13 02:32:27.328423 env[1256]: 2024-12-13 02:32:27.220 [INFO][4293] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" iface="eth0" netns="/var/run/netns/cni-adf4930f-505e-6a25-a07b-0577e43e1e04" Dec 13 02:32:27.328423 env[1256]: 2024-12-13 02:32:27.220 [INFO][4293] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" iface="eth0" netns="/var/run/netns/cni-adf4930f-505e-6a25-a07b-0577e43e1e04" Dec 13 02:32:27.328423 env[1256]: 2024-12-13 02:32:27.220 [INFO][4293] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" iface="eth0" netns="/var/run/netns/cni-adf4930f-505e-6a25-a07b-0577e43e1e04" Dec 13 02:32:27.328423 env[1256]: 2024-12-13 02:32:27.220 [INFO][4293] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Dec 13 02:32:27.328423 env[1256]: 2024-12-13 02:32:27.220 [INFO][4293] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Dec 13 02:32:27.328423 env[1256]: 2024-12-13 02:32:27.318 [INFO][4300] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" HandleID="k8s-pod-network.399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Workload="localhost-k8s-coredns--6f6b679f8f--tq85l-eth0" Dec 13 02:32:27.328423 env[1256]: 2024-12-13 02:32:27.318 [INFO][4300] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:32:27.328423 env[1256]: 2024-12-13 02:32:27.318 [INFO][4300] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:32:27.328423 env[1256]: 2024-12-13 02:32:27.323 [WARNING][4300] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" HandleID="k8s-pod-network.399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Workload="localhost-k8s-coredns--6f6b679f8f--tq85l-eth0" Dec 13 02:32:27.328423 env[1256]: 2024-12-13 02:32:27.323 [INFO][4300] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" HandleID="k8s-pod-network.399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Workload="localhost-k8s-coredns--6f6b679f8f--tq85l-eth0" Dec 13 02:32:27.328423 env[1256]: 2024-12-13 02:32:27.324 [INFO][4300] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:32:27.328423 env[1256]: 2024-12-13 02:32:27.325 [INFO][4293] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Dec 13 02:32:27.330305 systemd[1]: run-netns-cni\x2dadf4930f\x2d505e\x2d6a25\x2da07b\x2d0577e43e1e04.mount: Deactivated successfully. Dec 13 02:32:27.331456 env[1256]: time="2024-12-13T02:32:27.331158538Z" level=info msg="TearDown network for sandbox \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\" successfully" Dec 13 02:32:27.331456 env[1256]: time="2024-12-13T02:32:27.331192629Z" level=info msg="StopPodSandbox for \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\" returns successfully" Dec 13 02:32:27.334331 env[1256]: time="2024-12-13T02:32:27.334013364Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-tq85l,Uid:317605d2-93ce-4fec-922f-d14e17bc8373,Namespace:kube-system,Attempt:1,}" Dec 13 02:32:27.385172 systemd-networkd[1062]: vxlan.calico: Link UP Dec 13 02:32:27.385180 systemd-networkd[1062]: vxlan.calico: Gained carrier Dec 13 02:32:27.418000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.418000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.418000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.418000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.418000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.418000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.418000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.418000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.418000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.418000 audit: BPF prog-id=170 op=LOAD Dec 13 02:32:27.418000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee6ea2e60 a2=98 a3=ffffffff items=0 ppid=4177 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.418000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:27.418000 audit: BPF prog-id=170 op=UNLOAD Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit: BPF prog-id=171 op=LOAD Dec 13 02:32:27.420000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee6ea2c70 a2=74 a3=540051 items=0 ppid=4177 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:27.420000 audit: BPF prog-id=171 op=UNLOAD Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit: BPF prog-id=172 op=LOAD Dec 13 02:32:27.420000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee6ea2ca0 a2=94 a3=2 items=0 ppid=4177 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:27.420000 audit: BPF prog-id=172 op=UNLOAD Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee6ea2b70 a2=28 a3=0 items=0 ppid=4177 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee6ea2ba0 a2=28 a3=0 items=0 ppid=4177 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee6ea2ab0 a2=28 a3=0 items=0 ppid=4177 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee6ea2bc0 a2=28 a3=0 items=0 ppid=4177 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee6ea2ba0 a2=28 a3=0 items=0 ppid=4177 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee6ea2b90 a2=28 a3=0 items=0 ppid=4177 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee6ea2bc0 a2=28 a3=0 items=0 ppid=4177 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee6ea2ba0 a2=28 a3=0 items=0 ppid=4177 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee6ea2bc0 a2=28 a3=0 items=0 ppid=4177 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee6ea2b90 a2=28 a3=0 items=0 ppid=4177 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee6ea2c00 a2=28 a3=0 items=0 ppid=4177 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit: BPF prog-id=173 op=LOAD Dec 13 02:32:27.420000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee6ea2a70 a2=40 a3=0 items=0 ppid=4177 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:27.420000 audit: BPF prog-id=173 op=UNLOAD Dec 13 02:32:27.420000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.420000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffee6ea2a60 a2=50 a3=2800 items=0 ppid=4177 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.420000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffee6ea2a60 a2=50 a3=2800 items=0 ppid=4177 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.421000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit: BPF prog-id=174 op=LOAD Dec 13 02:32:27.421000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee6ea2280 a2=94 a3=2 items=0 ppid=4177 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.421000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:27.421000 audit: BPF prog-id=174 op=UNLOAD Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.421000 audit: BPF prog-id=175 op=LOAD Dec 13 02:32:27.421000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee6ea2380 a2=94 a3=2d items=0 ppid=4177 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.421000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit: BPF prog-id=176 op=LOAD Dec 13 02:32:27.425000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe221fdbb0 a2=98 a3=0 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.425000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.425000 audit: BPF prog-id=176 op=UNLOAD Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit: BPF prog-id=177 op=LOAD Dec 13 02:32:27.425000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe221fd990 a2=74 a3=540051 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.425000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.425000 audit: BPF prog-id=177 op=UNLOAD Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.425000 audit: BPF prog-id=178 op=LOAD Dec 13 02:32:27.425000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe221fd9c0 a2=94 a3=2 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.425000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.425000 audit: BPF prog-id=178 op=UNLOAD Dec 13 02:32:27.484263 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0a34d012c79: link becomes ready Dec 13 02:32:27.484684 systemd-networkd[1062]: cali0a34d012c79: Link UP Dec 13 02:32:27.484789 systemd-networkd[1062]: cali0a34d012c79: Gained carrier Dec 13 02:32:27.495900 env[1256]: 2024-12-13 02:32:27.379 [INFO][4319] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--tq85l-eth0 coredns-6f6b679f8f- kube-system 317605d2-93ce-4fec-922f-d14e17bc8373 883 0 2024-12-13 02:31:13 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-tq85l eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali0a34d012c79 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23" Namespace="kube-system" Pod="coredns-6f6b679f8f-tq85l" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tq85l-" Dec 13 02:32:27.495900 env[1256]: 2024-12-13 02:32:27.379 [INFO][4319] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23" Namespace="kube-system" Pod="coredns-6f6b679f8f-tq85l" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tq85l-eth0" Dec 13 02:32:27.495900 env[1256]: 2024-12-13 02:32:27.409 [INFO][4335] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23" HandleID="k8s-pod-network.dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23" Workload="localhost-k8s-coredns--6f6b679f8f--tq85l-eth0" Dec 13 02:32:27.495900 env[1256]: 2024-12-13 02:32:27.432 [INFO][4335] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23" HandleID="k8s-pod-network.dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23" Workload="localhost-k8s-coredns--6f6b679f8f--tq85l-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003187d0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-tq85l", "timestamp":"2024-12-13 02:32:27.409401904 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:32:27.495900 env[1256]: 2024-12-13 02:32:27.432 [INFO][4335] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:32:27.495900 env[1256]: 2024-12-13 02:32:27.433 [INFO][4335] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:32:27.495900 env[1256]: 2024-12-13 02:32:27.433 [INFO][4335] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:32:27.495900 env[1256]: 2024-12-13 02:32:27.434 [INFO][4335] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23" host="localhost" Dec 13 02:32:27.495900 env[1256]: 2024-12-13 02:32:27.440 [INFO][4335] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:32:27.495900 env[1256]: 2024-12-13 02:32:27.447 [INFO][4335] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:32:27.495900 env[1256]: 2024-12-13 02:32:27.448 [INFO][4335] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:32:27.495900 env[1256]: 2024-12-13 02:32:27.450 [INFO][4335] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:32:27.495900 env[1256]: 2024-12-13 02:32:27.450 [INFO][4335] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23" host="localhost" Dec 13 02:32:27.495900 env[1256]: 2024-12-13 02:32:27.453 [INFO][4335] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23 Dec 13 02:32:27.495900 env[1256]: 2024-12-13 02:32:27.456 [INFO][4335] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23" host="localhost" Dec 13 02:32:27.495900 env[1256]: 2024-12-13 02:32:27.467 [INFO][4335] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23" host="localhost" Dec 13 02:32:27.495900 env[1256]: 2024-12-13 02:32:27.467 [INFO][4335] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23" host="localhost" Dec 13 02:32:27.495900 env[1256]: 2024-12-13 02:32:27.467 [INFO][4335] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:32:27.495900 env[1256]: 2024-12-13 02:32:27.467 [INFO][4335] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23" HandleID="k8s-pod-network.dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23" Workload="localhost-k8s-coredns--6f6b679f8f--tq85l-eth0" Dec 13 02:32:27.497266 env[1256]: 2024-12-13 02:32:27.479 [INFO][4319] cni-plugin/k8s.go 386: Populated endpoint ContainerID="dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23" Namespace="kube-system" Pod="coredns-6f6b679f8f-tq85l" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tq85l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--tq85l-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"317605d2-93ce-4fec-922f-d14e17bc8373", ResourceVersion:"883", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-tq85l", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0a34d012c79", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:32:27.497266 env[1256]: 2024-12-13 02:32:27.479 [INFO][4319] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23" Namespace="kube-system" Pod="coredns-6f6b679f8f-tq85l" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tq85l-eth0" Dec 13 02:32:27.497266 env[1256]: 2024-12-13 02:32:27.479 [INFO][4319] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0a34d012c79 ContainerID="dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23" Namespace="kube-system" Pod="coredns-6f6b679f8f-tq85l" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tq85l-eth0" Dec 13 02:32:27.497266 env[1256]: 2024-12-13 02:32:27.485 [INFO][4319] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23" Namespace="kube-system" Pod="coredns-6f6b679f8f-tq85l" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tq85l-eth0" Dec 13 02:32:27.497266 env[1256]: 2024-12-13 02:32:27.485 [INFO][4319] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23" Namespace="kube-system" Pod="coredns-6f6b679f8f-tq85l" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tq85l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--tq85l-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"317605d2-93ce-4fec-922f-d14e17bc8373", ResourceVersion:"883", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23", Pod:"coredns-6f6b679f8f-tq85l", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0a34d012c79", MAC:"16:f7:33:32:c4:36", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:32:27.497266 env[1256]: 2024-12-13 02:32:27.493 [INFO][4319] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23" Namespace="kube-system" Pod="coredns-6f6b679f8f-tq85l" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--tq85l-eth0" Dec 13 02:32:27.520697 systemd[1]: run-containerd-runc-k8s.io-7171a5edbbc375e7652eff3c52e4f402fd7be2d4a7d6c45d439806b202cb4155-runc.MP3QWh.mount: Deactivated successfully. Dec 13 02:32:27.531203 env[1256]: time="2024-12-13T02:32:27.530748468Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:32:27.531203 env[1256]: time="2024-12-13T02:32:27.530780939Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:32:27.531203 env[1256]: time="2024-12-13T02:32:27.530788255Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:32:27.541402 env[1256]: time="2024-12-13T02:32:27.537300214Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23 pid=4391 runtime=io.containerd.runc.v2 Dec 13 02:32:27.557782 systemd[1]: run-containerd-runc-k8s.io-dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23-runc.OVeeed.mount: Deactivated successfully. Dec 13 02:32:27.568841 systemd[1]: Started cri-containerd-dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23.scope. Dec 13 02:32:27.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit: BPF prog-id=179 op=LOAD Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4391 pid=4404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461636433613332306333383538633936633362646639653838366563 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4391 pid=4404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461636433613332306333383538633936633362646639653838366563 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit: BPF prog-id=180 op=LOAD Dec 13 02:32:27.587000 audit[4404]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002ceec0 items=0 ppid=4391 pid=4404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461636433613332306333383538633936633362646639653838366563 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit: BPF prog-id=181 op=LOAD Dec 13 02:32:27.587000 audit[4404]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002cef08 items=0 ppid=4391 pid=4404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461636433613332306333383538633936633362646639653838366563 Dec 13 02:32:27.587000 audit: BPF prog-id=181 op=UNLOAD Dec 13 02:32:27.587000 audit: BPF prog-id=180 op=UNLOAD Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { perfmon } for pid=4404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit[4404]: AVC avc: denied { bpf } for pid=4404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.587000 audit: BPF prog-id=182 op=LOAD Dec 13 02:32:27.587000 audit[4404]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002cf318 items=0 ppid=4391 pid=4404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461636433613332306333383538633936633362646639653838366563 Dec 13 02:32:27.590000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.590000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.590000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.590000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.590000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.590000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.590000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.590000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.590000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.590000 audit: BPF prog-id=183 op=LOAD Dec 13 02:32:27.590000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe221fd880 a2=40 a3=1 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.590000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.590000 audit: BPF prog-id=183 op=UNLOAD Dec 13 02:32:27.590000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.590000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe221fd950 a2=50 a3=7ffe221fda30 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.590000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.590972 systemd-resolved[1204]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:32:27.592635 systemd-networkd[1062]: califdeaec08be0: Gained IPv6LL Dec 13 02:32:27.626959 env[1256]: time="2024-12-13T02:32:27.626934383Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-tq85l,Uid:317605d2-93ce-4fec-922f-d14e17bc8373,Namespace:kube-system,Attempt:1,} returns sandbox id \"dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23\"" Dec 13 02:32:27.629000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.629000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe221fd890 a2=28 a3=0 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.629000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.629000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe221fd8c0 a2=28 a3=0 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.629000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.629000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe221fd7d0 a2=28 a3=0 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.629000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.629000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe221fd8e0 a2=28 a3=0 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.629000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.629000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe221fd8c0 a2=28 a3=0 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.629000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.629000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe221fd8b0 a2=28 a3=0 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.629000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.629000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe221fd8e0 a2=28 a3=0 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.629000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.629000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe221fd8c0 a2=28 a3=0 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.629000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.629000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe221fd8e0 a2=28 a3=0 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.629000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.629000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe221fd8b0 a2=28 a3=0 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.629000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.629000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe221fd920 a2=28 a3=0 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.629000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.629000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe221fd6d0 a2=50 a3=1 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.629000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit: BPF prog-id=184 op=LOAD Dec 13 02:32:27.630000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe221fd6d0 a2=94 a3=5 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.630000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.630000 audit: BPF prog-id=184 op=UNLOAD Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe221fd780 a2=50 a3=1 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.630000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe221fd8a0 a2=4 a3=38 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.630000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.630000 audit[4354]: AVC avc: denied { confidentiality } for pid=4354 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:32:27.630000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe221fd8f0 a2=94 a3=6 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.630000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { confidentiality } for pid=4354 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:32:27.631000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe221fd0a0 a2=94 a3=83 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.631000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { perfmon } for pid=4354 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { confidentiality } for pid=4354 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:32:27.631000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe221fd0a0 a2=94 a3=83 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.631000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.631000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.631000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe221feae0 a2=10 a3=f1f00800 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.631000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.635283 env[1256]: time="2024-12-13T02:32:27.635262081Z" level=info msg="CreateContainer within sandbox \"dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:32:27.637000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.637000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe221fe980 a2=10 a3=3 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.637000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.637000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.637000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe221fe920 a2=10 a3=3 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.637000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.637000 audit[4354]: AVC avc: denied { bpf } for pid=4354 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.637000 audit[4354]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe221fe920 a2=10 a3=7 items=0 ppid=4177 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.637000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:32:27.643000 audit: BPF prog-id=175 op=UNLOAD Dec 13 02:32:27.716320 env[1256]: time="2024-12-13T02:32:27.716295733Z" level=info msg="CreateContainer within sandbox \"dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d024cea0e4c3505146cdf5c5d5cb3fc4022c73050843fe2600d8130c3c637111\"" Dec 13 02:32:27.716862 env[1256]: time="2024-12-13T02:32:27.716846254Z" level=info msg="StartContainer for \"d024cea0e4c3505146cdf5c5d5cb3fc4022c73050843fe2600d8130c3c637111\"" Dec 13 02:32:27.732293 systemd[1]: Started cri-containerd-d024cea0e4c3505146cdf5c5d5cb3fc4022c73050843fe2600d8130c3c637111.scope. Dec 13 02:32:27.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit: BPF prog-id=185 op=LOAD Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4391 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430323463656130653463333530353134366364663563356435636233 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4391 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430323463656130653463333530353134366364663563356435636233 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit: BPF prog-id=186 op=LOAD Dec 13 02:32:27.744000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000280b40 items=0 ppid=4391 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430323463656130653463333530353134366364663563356435636233 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit: BPF prog-id=187 op=LOAD Dec 13 02:32:27.744000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000280b88 items=0 ppid=4391 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430323463656130653463333530353134366364663563356435636233 Dec 13 02:32:27.744000 audit: BPF prog-id=187 op=UNLOAD Dec 13 02:32:27.744000 audit: BPF prog-id=186 op=UNLOAD Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:27.744000 audit: BPF prog-id=188 op=LOAD Dec 13 02:32:27.744000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000280f98 items=0 ppid=4391 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430323463656130653463333530353134366364663563356435636233 Dec 13 02:32:27.758485 env[1256]: time="2024-12-13T02:32:27.756990904Z" level=info msg="StartContainer for \"d024cea0e4c3505146cdf5c5d5cb3fc4022c73050843fe2600d8130c3c637111\" returns successfully" Dec 13 02:32:27.762000 audit[4493]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=4493 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:32:27.762000 audit[4493]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffdf577e080 a2=0 a3=7ffdf577e06c items=0 ppid=4177 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.762000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:32:27.768000 audit[4494]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=4494 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:32:27.768000 audit[4494]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe4109a6b0 a2=0 a3=7ffe4109a69c items=0 ppid=4177 pid=4494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.768000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:32:27.771000 audit[4492]: NETFILTER_CFG table=raw:99 family=2 entries=21 op=nft_register_chain pid=4492 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:32:27.771000 audit[4492]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc8b5375e0 a2=0 a3=7ffc8b5375cc items=0 ppid=4177 pid=4492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.771000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:32:27.773000 audit[4496]: NETFILTER_CFG table=filter:100 family=2 entries=69 op=nft_register_chain pid=4496 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:32:27.773000 audit[4496]: SYSCALL arch=c000003e syscall=46 success=yes exit=36404 a0=3 a1=7ffed8d83b00 a2=0 a3=7ffed8d83aec items=0 ppid=4177 pid=4496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.773000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:32:27.787000 audit[4503]: NETFILTER_CFG table=filter:101 family=2 entries=38 op=nft_register_chain pid=4503 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:32:27.787000 audit[4503]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd36b40c00 a2=0 a3=7ffd36b40bec items=0 ppid=4177 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:27.787000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:32:28.203881 env[1256]: time="2024-12-13T02:32:28.203853579Z" level=info msg="StopPodSandbox for \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\"" Dec 13 02:32:28.293970 env[1256]: 2024-12-13 02:32:28.263 [INFO][4526] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Dec 13 02:32:28.293970 env[1256]: 2024-12-13 02:32:28.263 [INFO][4526] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" iface="eth0" netns="/var/run/netns/cni-ea9f043e-73a7-6a41-ca94-58aea4909a72" Dec 13 02:32:28.293970 env[1256]: 2024-12-13 02:32:28.263 [INFO][4526] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" iface="eth0" netns="/var/run/netns/cni-ea9f043e-73a7-6a41-ca94-58aea4909a72" Dec 13 02:32:28.293970 env[1256]: 2024-12-13 02:32:28.263 [INFO][4526] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" iface="eth0" netns="/var/run/netns/cni-ea9f043e-73a7-6a41-ca94-58aea4909a72" Dec 13 02:32:28.293970 env[1256]: 2024-12-13 02:32:28.263 [INFO][4526] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Dec 13 02:32:28.293970 env[1256]: 2024-12-13 02:32:28.263 [INFO][4526] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Dec 13 02:32:28.293970 env[1256]: 2024-12-13 02:32:28.285 [INFO][4534] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" HandleID="k8s-pod-network.a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Workload="localhost-k8s-csi--node--driver--7z7tl-eth0" Dec 13 02:32:28.293970 env[1256]: 2024-12-13 02:32:28.285 [INFO][4534] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:32:28.293970 env[1256]: 2024-12-13 02:32:28.285 [INFO][4534] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:32:28.293970 env[1256]: 2024-12-13 02:32:28.289 [WARNING][4534] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" HandleID="k8s-pod-network.a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Workload="localhost-k8s-csi--node--driver--7z7tl-eth0" Dec 13 02:32:28.293970 env[1256]: 2024-12-13 02:32:28.289 [INFO][4534] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" HandleID="k8s-pod-network.a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Workload="localhost-k8s-csi--node--driver--7z7tl-eth0" Dec 13 02:32:28.293970 env[1256]: 2024-12-13 02:32:28.291 [INFO][4534] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:32:28.293970 env[1256]: 2024-12-13 02:32:28.292 [INFO][4526] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Dec 13 02:32:28.294561 env[1256]: time="2024-12-13T02:32:28.294538526Z" level=info msg="TearDown network for sandbox \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\" successfully" Dec 13 02:32:28.294636 env[1256]: time="2024-12-13T02:32:28.294624635Z" level=info msg="StopPodSandbox for \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\" returns successfully" Dec 13 02:32:28.295106 env[1256]: time="2024-12-13T02:32:28.295092572Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7z7tl,Uid:47c64936-f63c-409a-acf6-791447c02a65,Namespace:calico-system,Attempt:1,}" Dec 13 02:32:28.404281 systemd-networkd[1062]: cali315e6b2065c: Link UP Dec 13 02:32:28.404692 systemd-networkd[1062]: cali315e6b2065c: Gained carrier Dec 13 02:32:28.405225 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali315e6b2065c: link becomes ready Dec 13 02:32:28.423619 env[1256]: 2024-12-13 02:32:28.324 [INFO][4540] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--7z7tl-eth0 csi-node-driver- calico-system 47c64936-f63c-409a-acf6-791447c02a65 893 0 2024-12-13 02:31:21 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-7z7tl eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali315e6b2065c [] []}} ContainerID="61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c" Namespace="calico-system" Pod="csi-node-driver-7z7tl" WorkloadEndpoint="localhost-k8s-csi--node--driver--7z7tl-" Dec 13 02:32:28.423619 env[1256]: 2024-12-13 02:32:28.324 [INFO][4540] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c" Namespace="calico-system" Pod="csi-node-driver-7z7tl" WorkloadEndpoint="localhost-k8s-csi--node--driver--7z7tl-eth0" Dec 13 02:32:28.423619 env[1256]: 2024-12-13 02:32:28.354 [INFO][4552] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c" HandleID="k8s-pod-network.61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c" Workload="localhost-k8s-csi--node--driver--7z7tl-eth0" Dec 13 02:32:28.423619 env[1256]: 2024-12-13 02:32:28.363 [INFO][4552] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c" HandleID="k8s-pod-network.61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c" Workload="localhost-k8s-csi--node--driver--7z7tl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318a90), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-7z7tl", "timestamp":"2024-12-13 02:32:28.354315628 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:32:28.423619 env[1256]: 2024-12-13 02:32:28.363 [INFO][4552] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:32:28.423619 env[1256]: 2024-12-13 02:32:28.363 [INFO][4552] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:32:28.423619 env[1256]: 2024-12-13 02:32:28.363 [INFO][4552] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:32:28.423619 env[1256]: 2024-12-13 02:32:28.365 [INFO][4552] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c" host="localhost" Dec 13 02:32:28.423619 env[1256]: 2024-12-13 02:32:28.367 [INFO][4552] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:32:28.423619 env[1256]: 2024-12-13 02:32:28.371 [INFO][4552] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:32:28.423619 env[1256]: 2024-12-13 02:32:28.372 [INFO][4552] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:32:28.423619 env[1256]: 2024-12-13 02:32:28.374 [INFO][4552] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:32:28.423619 env[1256]: 2024-12-13 02:32:28.374 [INFO][4552] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c" host="localhost" Dec 13 02:32:28.423619 env[1256]: 2024-12-13 02:32:28.377 [INFO][4552] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c Dec 13 02:32:28.423619 env[1256]: 2024-12-13 02:32:28.382 [INFO][4552] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c" host="localhost" Dec 13 02:32:28.423619 env[1256]: 2024-12-13 02:32:28.389 [INFO][4552] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c" host="localhost" Dec 13 02:32:28.423619 env[1256]: 2024-12-13 02:32:28.389 [INFO][4552] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c" host="localhost" Dec 13 02:32:28.423619 env[1256]: 2024-12-13 02:32:28.389 [INFO][4552] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:32:28.423619 env[1256]: 2024-12-13 02:32:28.389 [INFO][4552] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c" HandleID="k8s-pod-network.61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c" Workload="localhost-k8s-csi--node--driver--7z7tl-eth0" Dec 13 02:32:28.424237 env[1256]: 2024-12-13 02:32:28.400 [INFO][4540] cni-plugin/k8s.go 386: Populated endpoint ContainerID="61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c" Namespace="calico-system" Pod="csi-node-driver-7z7tl" WorkloadEndpoint="localhost-k8s-csi--node--driver--7z7tl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--7z7tl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"47c64936-f63c-409a-acf6-791447c02a65", ResourceVersion:"893", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-7z7tl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali315e6b2065c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:32:28.424237 env[1256]: 2024-12-13 02:32:28.400 [INFO][4540] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c" Namespace="calico-system" Pod="csi-node-driver-7z7tl" WorkloadEndpoint="localhost-k8s-csi--node--driver--7z7tl-eth0" Dec 13 02:32:28.424237 env[1256]: 2024-12-13 02:32:28.401 [INFO][4540] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali315e6b2065c ContainerID="61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c" Namespace="calico-system" Pod="csi-node-driver-7z7tl" WorkloadEndpoint="localhost-k8s-csi--node--driver--7z7tl-eth0" Dec 13 02:32:28.424237 env[1256]: 2024-12-13 02:32:28.405 [INFO][4540] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c" Namespace="calico-system" Pod="csi-node-driver-7z7tl" WorkloadEndpoint="localhost-k8s-csi--node--driver--7z7tl-eth0" Dec 13 02:32:28.424237 env[1256]: 2024-12-13 02:32:28.405 [INFO][4540] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c" Namespace="calico-system" Pod="csi-node-driver-7z7tl" WorkloadEndpoint="localhost-k8s-csi--node--driver--7z7tl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--7z7tl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"47c64936-f63c-409a-acf6-791447c02a65", ResourceVersion:"893", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c", Pod:"csi-node-driver-7z7tl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali315e6b2065c", MAC:"9e:87:77:19:c0:07", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:32:28.424237 env[1256]: 2024-12-13 02:32:28.418 [INFO][4540] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c" Namespace="calico-system" Pod="csi-node-driver-7z7tl" WorkloadEndpoint="localhost-k8s-csi--node--driver--7z7tl-eth0" Dec 13 02:32:28.425000 audit[4563]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=4563 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:32:28.425000 audit[4563]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffe0f6d3630 a2=0 a3=7ffe0f6d361c items=0 ppid=4177 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:28.425000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:32:28.440810 env[1256]: time="2024-12-13T02:32:28.440748472Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:32:28.441068 env[1256]: time="2024-12-13T02:32:28.440981690Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:32:28.441068 env[1256]: time="2024-12-13T02:32:28.440992698Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:32:28.441242 env[1256]: time="2024-12-13T02:32:28.441195986Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c pid=4579 runtime=io.containerd.runc.v2 Dec 13 02:32:28.450942 systemd[1]: Started cri-containerd-61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c.scope. Dec 13 02:32:28.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.460000 audit: BPF prog-id=189 op=LOAD Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4579 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:28.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631626535376166383031633464356630346563386235653739316365 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4579 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:28.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631626535376166383031633464356630346563386235653739316365 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit: BPF prog-id=190 op=LOAD Dec 13 02:32:28.461000 audit[4589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000341ce0 items=0 ppid=4579 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:28.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631626535376166383031633464356630346563386235653739316365 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit: BPF prog-id=191 op=LOAD Dec 13 02:32:28.461000 audit[4589]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000341d28 items=0 ppid=4579 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:28.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631626535376166383031633464356630346563386235653739316365 Dec 13 02:32:28.461000 audit: BPF prog-id=191 op=UNLOAD Dec 13 02:32:28.461000 audit: BPF prog-id=190 op=UNLOAD Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { perfmon } for pid=4589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit[4589]: AVC avc: denied { bpf } for pid=4589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:28.461000 audit: BPF prog-id=192 op=LOAD Dec 13 02:32:28.461000 audit[4589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003aa138 items=0 ppid=4579 pid=4589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:28.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631626535376166383031633464356630346563386235653739316365 Dec 13 02:32:28.464054 systemd-resolved[1204]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:32:28.475480 env[1256]: time="2024-12-13T02:32:28.475458026Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7z7tl,Uid:47c64936-f63c-409a-acf6-791447c02a65,Namespace:calico-system,Attempt:1,} returns sandbox id \"61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c\"" Dec 13 02:32:28.522485 systemd[1]: run-netns-cni\x2dea9f043e\x2d73a7\x2d6a41\x2dca94\x2d58aea4909a72.mount: Deactivated successfully. Dec 13 02:32:28.620861 kubelet[2118]: I1213 02:32:28.620817 2118 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-tq85l" podStartSLOduration=75.571722962 podStartE2EDuration="1m15.571722962s" podCreationTimestamp="2024-12-13 02:31:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:32:28.523998293 +0000 UTC m=+80.503100761" watchObservedRunningTime="2024-12-13 02:32:28.571722962 +0000 UTC m=+80.550825435" Dec 13 02:32:28.749000 audit[4614]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=4614 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:28.749000 audit[4614]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe54102780 a2=0 a3=7ffe5410276c items=0 ppid=2250 pid=4614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:28.749000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:28.753000 audit[4614]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=4614 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:28.753000 audit[4614]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe54102780 a2=0 a3=0 items=0 ppid=2250 pid=4614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:28.753000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:28.873277 systemd-networkd[1062]: cali0a34d012c79: Gained IPv6LL Dec 13 02:32:29.064342 systemd-networkd[1062]: vxlan.calico: Gained IPv6LL Dec 13 02:32:29.314325 env[1256]: time="2024-12-13T02:32:29.314293201Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:29.348706 env[1256]: time="2024-12-13T02:32:29.348640244Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:29.357966 env[1256]: time="2024-12-13T02:32:29.357468397Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:29.371293 env[1256]: time="2024-12-13T02:32:29.371278302Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:29.371506 env[1256]: time="2024-12-13T02:32:29.371491214Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 02:32:29.571850 env[1256]: time="2024-12-13T02:32:29.571825487Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 02:32:29.576301 systemd-networkd[1062]: cali315e6b2065c: Gained IPv6LL Dec 13 02:32:29.704000 audit[4618]: NETFILTER_CFG table=filter:105 family=2 entries=13 op=nft_register_rule pid=4618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:29.704000 audit[4618]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcd3b19120 a2=0 a3=7ffcd3b1910c items=0 ppid=2250 pid=4618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:29.704000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:29.708000 audit[4618]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=4618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:29.708000 audit[4618]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffcd3b19120 a2=0 a3=7ffcd3b1910c items=0 ppid=2250 pid=4618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:29.708000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:30.152900 env[1256]: time="2024-12-13T02:32:30.152682913Z" level=info msg="CreateContainer within sandbox \"aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 02:32:30.379485 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2607385475.mount: Deactivated successfully. Dec 13 02:32:30.570792 env[1256]: time="2024-12-13T02:32:30.570384127Z" level=info msg="CreateContainer within sandbox \"aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"1d2d74af35d9bc770841d77c7bab8380d4620cfbe1a2451cde9c2732385d49b4\"" Dec 13 02:32:30.571083 env[1256]: time="2024-12-13T02:32:30.570817932Z" level=info msg="StartContainer for \"1d2d74af35d9bc770841d77c7bab8380d4620cfbe1a2451cde9c2732385d49b4\"" Dec 13 02:32:30.590936 systemd[1]: Started cri-containerd-1d2d74af35d9bc770841d77c7bab8380d4620cfbe1a2451cde9c2732385d49b4.scope. Dec 13 02:32:30.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.609000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.609000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.609000 audit: BPF prog-id=193 op=LOAD Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4105 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164326437346166333564396263373730383431643737633762616238 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4105 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164326437346166333564396263373730383431643737633762616238 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit: BPF prog-id=194 op=LOAD Dec 13 02:32:30.610000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000271fc0 items=0 ppid=4105 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164326437346166333564396263373730383431643737633762616238 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit: BPF prog-id=195 op=LOAD Dec 13 02:32:30.610000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000356008 items=0 ppid=4105 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164326437346166333564396263373730383431643737633762616238 Dec 13 02:32:30.610000 audit: BPF prog-id=195 op=UNLOAD Dec 13 02:32:30.610000 audit: BPF prog-id=194 op=UNLOAD Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:30.610000 audit: BPF prog-id=196 op=LOAD Dec 13 02:32:30.610000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000356418 items=0 ppid=4105 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:30.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164326437346166333564396263373730383431643737633762616238 Dec 13 02:32:30.656201 env[1256]: time="2024-12-13T02:32:30.655421358Z" level=info msg="StartContainer for \"1d2d74af35d9bc770841d77c7bab8380d4620cfbe1a2451cde9c2732385d49b4\" returns successfully" Dec 13 02:32:31.133089 systemd[1]: Started sshd@7-139.178.70.105:22-147.75.109.163:43088.service. Dec 13 02:32:31.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.105:22-147.75.109.163:43088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:31.166969 env[1256]: time="2024-12-13T02:32:31.166939269Z" level=info msg="StopPodSandbox for \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\"" Dec 13 02:32:31.227000 audit[4664]: USER_ACCT pid=4664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:31.229803 sshd[4664]: Accepted publickey for core from 147.75.109.163 port 43088 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:32:31.233000 audit[4664]: CRED_ACQ pid=4664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:31.233000 audit[4664]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd140d680 a2=3 a3=0 items=0 ppid=1 pid=4664 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:31.233000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:31.236914 sshd[4664]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:31.244656 systemd[1]: Started session-10.scope. Dec 13 02:32:31.244880 systemd-logind[1241]: New session 10 of user core. Dec 13 02:32:31.248000 audit[4664]: USER_START pid=4664 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:31.249000 audit[4692]: CRED_ACQ pid=4692 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:31.252501 env[1256]: 2024-12-13 02:32:31.214 [INFO][4679] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Dec 13 02:32:31.252501 env[1256]: 2024-12-13 02:32:31.214 [INFO][4679] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" iface="eth0" netns="/var/run/netns/cni-0f4dbe2e-ffbd-afdb-1de1-588ddab81ad6" Dec 13 02:32:31.252501 env[1256]: 2024-12-13 02:32:31.214 [INFO][4679] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" iface="eth0" netns="/var/run/netns/cni-0f4dbe2e-ffbd-afdb-1de1-588ddab81ad6" Dec 13 02:32:31.252501 env[1256]: 2024-12-13 02:32:31.214 [INFO][4679] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" iface="eth0" netns="/var/run/netns/cni-0f4dbe2e-ffbd-afdb-1de1-588ddab81ad6" Dec 13 02:32:31.252501 env[1256]: 2024-12-13 02:32:31.214 [INFO][4679] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Dec 13 02:32:31.252501 env[1256]: 2024-12-13 02:32:31.214 [INFO][4679] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Dec 13 02:32:31.252501 env[1256]: 2024-12-13 02:32:31.236 [INFO][4686] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" HandleID="k8s-pod-network.49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0" Dec 13 02:32:31.252501 env[1256]: 2024-12-13 02:32:31.236 [INFO][4686] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:32:31.252501 env[1256]: 2024-12-13 02:32:31.236 [INFO][4686] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:32:31.252501 env[1256]: 2024-12-13 02:32:31.242 [WARNING][4686] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" HandleID="k8s-pod-network.49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0" Dec 13 02:32:31.252501 env[1256]: 2024-12-13 02:32:31.243 [INFO][4686] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" HandleID="k8s-pod-network.49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0" Dec 13 02:32:31.252501 env[1256]: 2024-12-13 02:32:31.246 [INFO][4686] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:32:31.252501 env[1256]: 2024-12-13 02:32:31.250 [INFO][4679] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Dec 13 02:32:31.254412 systemd[1]: run-netns-cni\x2d0f4dbe2e\x2dffbd\x2dafdb\x2d1de1\x2d588ddab81ad6.mount: Deactivated successfully. Dec 13 02:32:31.255248 env[1256]: time="2024-12-13T02:32:31.255080166Z" level=info msg="TearDown network for sandbox \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\" successfully" Dec 13 02:32:31.255248 env[1256]: time="2024-12-13T02:32:31.255102286Z" level=info msg="StopPodSandbox for \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\" returns successfully" Dec 13 02:32:31.255660 env[1256]: time="2024-12-13T02:32:31.255629572Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f6fd9c6dd-r886t,Uid:b15320b7-471e-4e9e-a144-a40693bd62f6,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:32:31.438625 systemd-networkd[1062]: cali3b7c6651c45: Link UP Dec 13 02:32:31.441499 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:32:31.442216 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3b7c6651c45: link becomes ready Dec 13 02:32:31.441724 systemd-networkd[1062]: cali3b7c6651c45: Gained carrier Dec 13 02:32:31.453681 env[1256]: 2024-12-13 02:32:31.284 [INFO][4693] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0 calico-apiserver-5f6fd9c6dd- calico-apiserver b15320b7-471e-4e9e-a144-a40693bd62f6 944 0 2024-12-13 02:31:21 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5f6fd9c6dd projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5f6fd9c6dd-r886t eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali3b7c6651c45 [] []}} ContainerID="e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2" Namespace="calico-apiserver" Pod="calico-apiserver-5f6fd9c6dd-r886t" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-" Dec 13 02:32:31.453681 env[1256]: 2024-12-13 02:32:31.284 [INFO][4693] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2" Namespace="calico-apiserver" Pod="calico-apiserver-5f6fd9c6dd-r886t" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0" Dec 13 02:32:31.453681 env[1256]: 2024-12-13 02:32:31.304 [INFO][4704] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2" HandleID="k8s-pod-network.e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0" Dec 13 02:32:31.453681 env[1256]: 2024-12-13 02:32:31.311 [INFO][4704] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2" HandleID="k8s-pod-network.e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318940), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5f6fd9c6dd-r886t", "timestamp":"2024-12-13 02:32:31.304262086 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:32:31.453681 env[1256]: 2024-12-13 02:32:31.311 [INFO][4704] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:32:31.453681 env[1256]: 2024-12-13 02:32:31.311 [INFO][4704] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:32:31.453681 env[1256]: 2024-12-13 02:32:31.311 [INFO][4704] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:32:31.453681 env[1256]: 2024-12-13 02:32:31.312 [INFO][4704] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2" host="localhost" Dec 13 02:32:31.453681 env[1256]: 2024-12-13 02:32:31.410 [INFO][4704] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:32:31.453681 env[1256]: 2024-12-13 02:32:31.414 [INFO][4704] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:32:31.453681 env[1256]: 2024-12-13 02:32:31.415 [INFO][4704] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:32:31.453681 env[1256]: 2024-12-13 02:32:31.420 [INFO][4704] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:32:31.453681 env[1256]: 2024-12-13 02:32:31.420 [INFO][4704] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2" host="localhost" Dec 13 02:32:31.453681 env[1256]: 2024-12-13 02:32:31.421 [INFO][4704] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2 Dec 13 02:32:31.453681 env[1256]: 2024-12-13 02:32:31.424 [INFO][4704] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2" host="localhost" Dec 13 02:32:31.453681 env[1256]: 2024-12-13 02:32:31.428 [INFO][4704] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2" host="localhost" Dec 13 02:32:31.453681 env[1256]: 2024-12-13 02:32:31.428 [INFO][4704] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2" host="localhost" Dec 13 02:32:31.453681 env[1256]: 2024-12-13 02:32:31.428 [INFO][4704] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:32:31.453681 env[1256]: 2024-12-13 02:32:31.428 [INFO][4704] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2" HandleID="k8s-pod-network.e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0" Dec 13 02:32:31.457435 env[1256]: 2024-12-13 02:32:31.430 [INFO][4693] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2" Namespace="calico-apiserver" Pod="calico-apiserver-5f6fd9c6dd-r886t" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0", GenerateName:"calico-apiserver-5f6fd9c6dd-", Namespace:"calico-apiserver", SelfLink:"", UID:"b15320b7-471e-4e9e-a144-a40693bd62f6", ResourceVersion:"944", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f6fd9c6dd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5f6fd9c6dd-r886t", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3b7c6651c45", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:32:31.457435 env[1256]: 2024-12-13 02:32:31.430 [INFO][4693] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2" Namespace="calico-apiserver" Pod="calico-apiserver-5f6fd9c6dd-r886t" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0" Dec 13 02:32:31.457435 env[1256]: 2024-12-13 02:32:31.430 [INFO][4693] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3b7c6651c45 ContainerID="e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2" Namespace="calico-apiserver" Pod="calico-apiserver-5f6fd9c6dd-r886t" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0" Dec 13 02:32:31.457435 env[1256]: 2024-12-13 02:32:31.442 [INFO][4693] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2" Namespace="calico-apiserver" Pod="calico-apiserver-5f6fd9c6dd-r886t" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0" Dec 13 02:32:31.457435 env[1256]: 2024-12-13 02:32:31.443 [INFO][4693] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2" Namespace="calico-apiserver" Pod="calico-apiserver-5f6fd9c6dd-r886t" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0", GenerateName:"calico-apiserver-5f6fd9c6dd-", Namespace:"calico-apiserver", SelfLink:"", UID:"b15320b7-471e-4e9e-a144-a40693bd62f6", ResourceVersion:"944", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f6fd9c6dd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2", Pod:"calico-apiserver-5f6fd9c6dd-r886t", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3b7c6651c45", MAC:"82:68:52:da:bb:e2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:32:31.457435 env[1256]: 2024-12-13 02:32:31.449 [INFO][4693] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2" Namespace="calico-apiserver" Pod="calico-apiserver-5f6fd9c6dd-r886t" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0" Dec 13 02:32:31.485000 audit[4746]: NETFILTER_CFG table=filter:107 family=2 entries=58 op=nft_register_chain pid=4746 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:32:31.485000 audit[4746]: SYSCALL arch=c000003e syscall=46 success=yes exit=29908 a0=3 a1=7ffc5c3ed990 a2=0 a3=7ffc5c3ed97c items=0 ppid=4177 pid=4746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:31.485000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:32:31.488512 env[1256]: time="2024-12-13T02:32:31.488450284Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:32:31.488569 env[1256]: time="2024-12-13T02:32:31.488519496Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:32:31.488569 env[1256]: time="2024-12-13T02:32:31.488536138Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:32:31.488647 env[1256]: time="2024-12-13T02:32:31.488628724Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2 pid=4741 runtime=io.containerd.runc.v2 Dec 13 02:32:31.522500 systemd[1]: Started cri-containerd-e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2.scope. Dec 13 02:32:31.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit: BPF prog-id=197 op=LOAD Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[4755]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4741 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:31.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532363831316265346133653335343332346361656238316633303639 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[4755]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4741 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:31.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532363831316265346133653335343332346361656238316633303639 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit: BPF prog-id=198 op=LOAD Dec 13 02:32:31.537000 audit[4755]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002f49e0 items=0 ppid=4741 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:31.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532363831316265346133653335343332346361656238316633303639 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.537000 audit: BPF prog-id=199 op=LOAD Dec 13 02:32:31.537000 audit[4755]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002f4a28 items=0 ppid=4741 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:31.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532363831316265346133653335343332346361656238316633303639 Dec 13 02:32:31.537000 audit: BPF prog-id=199 op=UNLOAD Dec 13 02:32:31.537000 audit: BPF prog-id=198 op=UNLOAD Dec 13 02:32:31.538000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.538000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.538000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.538000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.538000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.538000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.538000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.538000 audit[4755]: AVC avc: denied { perfmon } for pid=4755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.538000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.538000 audit[4755]: AVC avc: denied { bpf } for pid=4755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.538000 audit: BPF prog-id=200 op=LOAD Dec 13 02:32:31.538000 audit[4755]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002f4e38 items=0 ppid=4741 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:31.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532363831316265346133653335343332346361656238316633303639 Dec 13 02:32:31.540837 systemd-resolved[1204]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:32:31.597841 env[1256]: time="2024-12-13T02:32:31.597817830Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f6fd9c6dd-r886t,Uid:b15320b7-471e-4e9e-a144-a40693bd62f6,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2\"" Dec 13 02:32:31.611014 env[1256]: time="2024-12-13T02:32:31.610981636Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:31.612112 env[1256]: time="2024-12-13T02:32:31.611911441Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:31.613241 env[1256]: time="2024-12-13T02:32:31.612933962Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:31.613783 env[1256]: time="2024-12-13T02:32:31.613766133Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:31.614496 env[1256]: time="2024-12-13T02:32:31.614051139Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 02:32:31.669201 env[1256]: time="2024-12-13T02:32:31.668387466Z" level=info msg="CreateContainer within sandbox \"61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 02:32:31.707774 env[1256]: time="2024-12-13T02:32:31.707745112Z" level=info msg="CreateContainer within sandbox \"61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"ccb9424def4dd41fd7d2b86151f21982b48713601d5f752410603233a0dcfc74\"" Dec 13 02:32:31.712979 env[1256]: time="2024-12-13T02:32:31.712962331Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 02:32:31.722792 env[1256]: time="2024-12-13T02:32:31.722774126Z" level=info msg="StartContainer for \"ccb9424def4dd41fd7d2b86151f21982b48713601d5f752410603233a0dcfc74\"" Dec 13 02:32:31.738584 systemd[1]: Started cri-containerd-ccb9424def4dd41fd7d2b86151f21982b48713601d5f752410603233a0dcfc74.scope. Dec 13 02:32:31.759000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.759000 audit[4785]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f73cb59cbd8 items=0 ppid=4579 pid=4785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:31.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623934323464656634646434316664376432623836313531663231 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit: BPF prog-id=201 op=LOAD Dec 13 02:32:31.760000 audit[4785]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000ac9d8 items=0 ppid=4579 pid=4785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:31.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623934323464656634646434316664376432623836313531663231 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit: BPF prog-id=202 op=LOAD Dec 13 02:32:31.760000 audit[4785]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000aca28 items=0 ppid=4579 pid=4785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:31.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623934323464656634646434316664376432623836313531663231 Dec 13 02:32:31.760000 audit: BPF prog-id=202 op=UNLOAD Dec 13 02:32:31.760000 audit: BPF prog-id=201 op=UNLOAD Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { perfmon } for pid=4785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit[4785]: AVC avc: denied { bpf } for pid=4785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:31.760000 audit: BPF prog-id=203 op=LOAD Dec 13 02:32:31.760000 audit[4785]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000acab8 items=0 ppid=4579 pid=4785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:31.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623934323464656634646434316664376432623836313531663231 Dec 13 02:32:31.775949 env[1256]: time="2024-12-13T02:32:31.775924739Z" level=info msg="StartContainer for \"ccb9424def4dd41fd7d2b86151f21982b48713601d5f752410603233a0dcfc74\" returns successfully" Dec 13 02:32:32.175481 systemd[1]: run-containerd-runc-k8s.io-1d2d74af35d9bc770841d77c7bab8380d4620cfbe1a2451cde9c2732385d49b4-runc.hNWv6W.mount: Deactivated successfully. Dec 13 02:32:32.279926 kubelet[2118]: I1213 02:32:32.253831 2118 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7755b4b488-k842l" podStartSLOduration=68.105455615 podStartE2EDuration="1m11.237499929s" podCreationTimestamp="2024-12-13 02:31:21 +0000 UTC" firstStartedPulling="2024-12-13 02:32:26.411961102 +0000 UTC m=+78.391063565" lastFinishedPulling="2024-12-13 02:32:29.544005412 +0000 UTC m=+81.523107879" observedRunningTime="2024-12-13 02:32:32.229992469 +0000 UTC m=+84.209094939" watchObservedRunningTime="2024-12-13 02:32:32.237499929 +0000 UTC m=+84.216602401" Dec 13 02:32:32.484416 sshd[4664]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:32.493528 kernel: kauditd_printk_skb: 862 callbacks suppressed Dec 13 02:32:32.493574 kernel: audit: type=1106 audit(1734057152.484:1317): pid=4664 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:32.498584 kernel: audit: type=1104 audit(1734057152.489:1318): pid=4664 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:32.498624 kernel: audit: type=1131 audit(1734057152.493:1319): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.105:22-147.75.109.163:43088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:32.484000 audit[4664]: USER_END pid=4664 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:32.489000 audit[4664]: CRED_DISP pid=4664 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:32.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.105:22-147.75.109.163:43088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:32.494346 systemd[1]: sshd@7-139.178.70.105:22-147.75.109.163:43088.service: Deactivated successfully. Dec 13 02:32:32.494875 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 02:32:32.497823 systemd-logind[1241]: Session 10 logged out. Waiting for processes to exit. Dec 13 02:32:32.498390 systemd-logind[1241]: Removed session 10. Dec 13 02:32:33.288304 systemd-networkd[1062]: cali3b7c6651c45: Gained IPv6LL Dec 13 02:32:34.392266 env[1256]: time="2024-12-13T02:32:34.392224496Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:34.392943 env[1256]: time="2024-12-13T02:32:34.392926102Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:34.393731 env[1256]: time="2024-12-13T02:32:34.393715802Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:34.396605 env[1256]: time="2024-12-13T02:32:34.394478190Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:34.396605 env[1256]: time="2024-12-13T02:32:34.394826358Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 02:32:34.409862 env[1256]: time="2024-12-13T02:32:34.409837886Z" level=info msg="CreateContainer within sandbox \"e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:32:34.410076 env[1256]: time="2024-12-13T02:32:34.409860728Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 02:32:34.419167 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount531652306.mount: Deactivated successfully. Dec 13 02:32:34.421331 env[1256]: time="2024-12-13T02:32:34.421311191Z" level=info msg="CreateContainer within sandbox \"e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"090da588c6abb50f0d359818a70d787c4f1671cb4d34fb3ab938d38cc747ae83\"" Dec 13 02:32:34.422516 env[1256]: time="2024-12-13T02:32:34.422497039Z" level=info msg="StartContainer for \"090da588c6abb50f0d359818a70d787c4f1671cb4d34fb3ab938d38cc747ae83\"" Dec 13 02:32:34.447310 systemd[1]: Started cri-containerd-090da588c6abb50f0d359818a70d787c4f1671cb4d34fb3ab938d38cc747ae83.scope. Dec 13 02:32:34.478185 kernel: audit: type=1400 audit(1734057154.471:1320): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.478256 kernel: audit: type=1400 audit(1734057154.471:1321): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.500283 kernel: audit: type=1400 audit(1734057154.471:1322): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.500334 kernel: audit: type=1400 audit(1734057154.471:1323): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.500357 kernel: audit: type=1400 audit(1734057154.471:1324): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.500374 kernel: audit: type=1400 audit(1734057154.471:1325): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.500491 kernel: audit: type=1400 audit(1734057154.471:1326): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.476000 audit: BPF prog-id=204 op=LOAD Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { bpf } for pid=4849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4741 pid=4849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:34.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039306461353838633661626235306630643335393831386137306437 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { perfmon } for pid=4849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4741 pid=4849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:34.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039306461353838633661626235306630643335393831386137306437 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { bpf } for pid=4849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { bpf } for pid=4849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { bpf } for pid=4849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { perfmon } for pid=4849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { perfmon } for pid=4849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { perfmon } for pid=4849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { perfmon } for pid=4849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { perfmon } for pid=4849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { bpf } for pid=4849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { bpf } for pid=4849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit: BPF prog-id=205 op=LOAD Dec 13 02:32:34.481000 audit[4849]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000323ef0 items=0 ppid=4741 pid=4849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:34.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039306461353838633661626235306630643335393831386137306437 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { bpf } for pid=4849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { bpf } for pid=4849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { perfmon } for pid=4849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { perfmon } for pid=4849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { perfmon } for pid=4849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { perfmon } for pid=4849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { perfmon } for pid=4849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { bpf } for pid=4849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { bpf } for pid=4849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit: BPF prog-id=206 op=LOAD Dec 13 02:32:34.481000 audit[4849]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000323f38 items=0 ppid=4741 pid=4849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:34.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039306461353838633661626235306630643335393831386137306437 Dec 13 02:32:34.481000 audit: BPF prog-id=206 op=UNLOAD Dec 13 02:32:34.481000 audit: BPF prog-id=205 op=UNLOAD Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { bpf } for pid=4849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { bpf } for pid=4849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { bpf } for pid=4849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { perfmon } for pid=4849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { perfmon } for pid=4849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { perfmon } for pid=4849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { perfmon } for pid=4849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { perfmon } for pid=4849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { bpf } for pid=4849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit[4849]: AVC avc: denied { bpf } for pid=4849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:34.481000 audit: BPF prog-id=207 op=LOAD Dec 13 02:32:34.481000 audit[4849]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000372348 items=0 ppid=4741 pid=4849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:34.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039306461353838633661626235306630643335393831386137306437 Dec 13 02:32:34.544746 env[1256]: time="2024-12-13T02:32:34.522106297Z" level=info msg="StartContainer for \"090da588c6abb50f0d359818a70d787c4f1671cb4d34fb3ab938d38cc747ae83\" returns successfully" Dec 13 02:32:35.021000 audit[4880]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=4880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:35.021000 audit[4880]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe65cbadb0 a2=0 a3=7ffe65cbad9c items=0 ppid=2250 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.021000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:35.029000 audit[4880]: NETFILTER_CFG table=nat:109 family=2 entries=20 op=nft_register_rule pid=4880 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:35.029000 audit[4880]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe65cbadb0 a2=0 a3=7ffe65cbad9c items=0 ppid=2250 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.029000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:35.186000 audit[4860]: AVC avc: denied { watch } for pid=4860 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_31_33.3694933065/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c1017 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c394,c1017 tclass=file permissive=0 Dec 13 02:32:35.186000 audit[4860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b5d6c0 a2=fc6 a3=0 items=0 ppid=4741 pid=4860 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c1017 key=(null) Dec 13 02:32:35.186000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:32:35.223895 kubelet[2118]: I1213 02:32:35.221458 2118 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-r886t" podStartSLOduration=71.484840195 podStartE2EDuration="1m14.218784836s" podCreationTimestamp="2024-12-13 02:31:21 +0000 UTC" firstStartedPulling="2024-12-13 02:32:31.66387763 +0000 UTC m=+83.642980093" lastFinishedPulling="2024-12-13 02:32:34.397822267 +0000 UTC m=+86.376924734" observedRunningTime="2024-12-13 02:32:34.95919489 +0000 UTC m=+86.938297359" watchObservedRunningTime="2024-12-13 02:32:35.218784836 +0000 UTC m=+87.197887311" Dec 13 02:32:35.229000 audit[4882]: NETFILTER_CFG table=filter:110 family=2 entries=9 op=nft_register_rule pid=4882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:35.229000 audit[4882]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc2e27ea70 a2=0 a3=7ffc2e27ea5c items=0 ppid=2250 pid=4882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.229000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:35.233000 audit[4882]: NETFILTER_CFG table=nat:111 family=2 entries=27 op=nft_register_chain pid=4882 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:35.233000 audit[4882]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc2e27ea70 a2=0 a3=7ffc2e27ea5c items=0 ppid=2250 pid=4882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:35.233000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:35.966311 env[1256]: time="2024-12-13T02:32:35.966263875Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:35.967210 env[1256]: time="2024-12-13T02:32:35.967189678Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:35.968188 env[1256]: time="2024-12-13T02:32:35.968169566Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:35.969013 env[1256]: time="2024-12-13T02:32:35.968991677Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:32:35.969361 env[1256]: time="2024-12-13T02:32:35.969338349Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 02:32:35.973355 env[1256]: time="2024-12-13T02:32:35.973318498Z" level=info msg="CreateContainer within sandbox \"61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 02:32:35.981418 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2606295143.mount: Deactivated successfully. Dec 13 02:32:35.982855 env[1256]: time="2024-12-13T02:32:35.982830983Z" level=info msg="CreateContainer within sandbox \"61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"21c7ec83a767e8e75f9429d84dba8b8742b8afa2efeb1ad24bc5d0bd6231d08c\"" Dec 13 02:32:35.984188 env[1256]: time="2024-12-13T02:32:35.983400304Z" level=info msg="StartContainer for \"21c7ec83a767e8e75f9429d84dba8b8742b8afa2efeb1ad24bc5d0bd6231d08c\"" Dec 13 02:32:36.002580 systemd[1]: run-containerd-runc-k8s.io-21c7ec83a767e8e75f9429d84dba8b8742b8afa2efeb1ad24bc5d0bd6231d08c-runc.h5vSul.mount: Deactivated successfully. Dec 13 02:32:36.003992 systemd[1]: Started cri-containerd-21c7ec83a767e8e75f9429d84dba8b8742b8afa2efeb1ad24bc5d0bd6231d08c.scope. Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { perfmon } for pid=4891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa63037f718 items=0 ppid=4579 pid=4891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:36.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231633765633833613736376538653735663934323964383464626138 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { bpf } for pid=4891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { bpf } for pid=4891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { bpf } for pid=4891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { perfmon } for pid=4891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { perfmon } for pid=4891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { perfmon } for pid=4891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { perfmon } for pid=4891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { perfmon } for pid=4891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { bpf } for pid=4891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { bpf } for pid=4891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit: BPF prog-id=208 op=LOAD Dec 13 02:32:36.014000 audit[4891]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000313ec8 items=0 ppid=4579 pid=4891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:36.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231633765633833613736376538653735663934323964383464626138 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { bpf } for pid=4891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { bpf } for pid=4891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { perfmon } for pid=4891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { perfmon } for pid=4891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { perfmon } for pid=4891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { perfmon } for pid=4891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { perfmon } for pid=4891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { bpf } for pid=4891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { bpf } for pid=4891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit: BPF prog-id=209 op=LOAD Dec 13 02:32:36.014000 audit[4891]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000313f18 items=0 ppid=4579 pid=4891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:36.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231633765633833613736376538653735663934323964383464626138 Dec 13 02:32:36.014000 audit: BPF prog-id=209 op=UNLOAD Dec 13 02:32:36.014000 audit: BPF prog-id=208 op=UNLOAD Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { bpf } for pid=4891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { bpf } for pid=4891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { bpf } for pid=4891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { perfmon } for pid=4891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { perfmon } for pid=4891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { perfmon } for pid=4891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { perfmon } for pid=4891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { perfmon } for pid=4891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { bpf } for pid=4891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit[4891]: AVC avc: denied { bpf } for pid=4891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:36.014000 audit: BPF prog-id=210 op=LOAD Dec 13 02:32:36.014000 audit[4891]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000313fa8 items=0 ppid=4579 pid=4891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:36.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231633765633833613736376538653735663934323964383464626138 Dec 13 02:32:36.025259 env[1256]: time="2024-12-13T02:32:36.025231973Z" level=info msg="StartContainer for \"21c7ec83a767e8e75f9429d84dba8b8742b8afa2efeb1ad24bc5d0bd6231d08c\" returns successfully" Dec 13 02:32:36.171078 env[1256]: time="2024-12-13T02:32:36.171050519Z" level=info msg="StopPodSandbox for \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\"" Dec 13 02:32:36.171967 env[1256]: time="2024-12-13T02:32:36.171272541Z" level=info msg="StopPodSandbox for \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\"" Dec 13 02:32:36.599513 kubelet[2118]: I1213 02:32:36.599487 2118 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 02:32:36.620298 kubelet[2118]: I1213 02:32:36.620278 2118 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 02:32:37.275070 env[1256]: 2024-12-13 02:32:36.557 [INFO][4945] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Dec 13 02:32:37.275070 env[1256]: 2024-12-13 02:32:36.563 [INFO][4945] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" iface="eth0" netns="/var/run/netns/cni-738c86d0-3c3f-57f6-251c-ae0cbfde2dd5" Dec 13 02:32:37.275070 env[1256]: 2024-12-13 02:32:36.564 [INFO][4945] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" iface="eth0" netns="/var/run/netns/cni-738c86d0-3c3f-57f6-251c-ae0cbfde2dd5" Dec 13 02:32:37.275070 env[1256]: 2024-12-13 02:32:36.571 [INFO][4945] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" iface="eth0" netns="/var/run/netns/cni-738c86d0-3c3f-57f6-251c-ae0cbfde2dd5" Dec 13 02:32:37.275070 env[1256]: 2024-12-13 02:32:36.571 [INFO][4945] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Dec 13 02:32:37.275070 env[1256]: 2024-12-13 02:32:36.571 [INFO][4945] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Dec 13 02:32:37.275070 env[1256]: 2024-12-13 02:32:37.193 [INFO][4961] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" HandleID="k8s-pod-network.0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0" Dec 13 02:32:37.275070 env[1256]: 2024-12-13 02:32:37.193 [INFO][4961] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:32:37.275070 env[1256]: 2024-12-13 02:32:37.193 [INFO][4961] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:32:37.275070 env[1256]: 2024-12-13 02:32:37.270 [WARNING][4961] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" HandleID="k8s-pod-network.0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0" Dec 13 02:32:37.275070 env[1256]: 2024-12-13 02:32:37.271 [INFO][4961] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" HandleID="k8s-pod-network.0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0" Dec 13 02:32:37.275070 env[1256]: 2024-12-13 02:32:37.271 [INFO][4961] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:32:37.275070 env[1256]: 2024-12-13 02:32:37.273 [INFO][4945] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Dec 13 02:32:37.291276 env[1256]: time="2024-12-13T02:32:37.278396970Z" level=info msg="TearDown network for sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\" successfully" Dec 13 02:32:37.291276 env[1256]: time="2024-12-13T02:32:37.278425445Z" level=info msg="StopPodSandbox for \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\" returns successfully" Dec 13 02:32:37.291276 env[1256]: 2024-12-13 02:32:36.562 [INFO][4941] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Dec 13 02:32:37.291276 env[1256]: 2024-12-13 02:32:36.563 [INFO][4941] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" iface="eth0" netns="/var/run/netns/cni-90ff34ed-066a-590d-e6b7-32ed9ebff2f9" Dec 13 02:32:37.291276 env[1256]: 2024-12-13 02:32:36.564 [INFO][4941] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" iface="eth0" netns="/var/run/netns/cni-90ff34ed-066a-590d-e6b7-32ed9ebff2f9" Dec 13 02:32:37.291276 env[1256]: 2024-12-13 02:32:36.569 [INFO][4941] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" iface="eth0" netns="/var/run/netns/cni-90ff34ed-066a-590d-e6b7-32ed9ebff2f9" Dec 13 02:32:37.291276 env[1256]: 2024-12-13 02:32:36.569 [INFO][4941] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Dec 13 02:32:37.291276 env[1256]: 2024-12-13 02:32:36.569 [INFO][4941] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Dec 13 02:32:37.291276 env[1256]: 2024-12-13 02:32:37.193 [INFO][4960] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" HandleID="k8s-pod-network.8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Workload="localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0" Dec 13 02:32:37.291276 env[1256]: 2024-12-13 02:32:37.193 [INFO][4960] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:32:37.291276 env[1256]: 2024-12-13 02:32:37.271 [INFO][4960] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:32:37.291276 env[1256]: 2024-12-13 02:32:37.279 [WARNING][4960] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" HandleID="k8s-pod-network.8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Workload="localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0" Dec 13 02:32:37.291276 env[1256]: 2024-12-13 02:32:37.279 [INFO][4960] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" HandleID="k8s-pod-network.8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Workload="localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0" Dec 13 02:32:37.291276 env[1256]: 2024-12-13 02:32:37.280 [INFO][4960] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:32:37.291276 env[1256]: 2024-12-13 02:32:37.281 [INFO][4941] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Dec 13 02:32:37.291276 env[1256]: time="2024-12-13T02:32:37.285813722Z" level=info msg="TearDown network for sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\" successfully" Dec 13 02:32:37.291276 env[1256]: time="2024-12-13T02:32:37.285839585Z" level=info msg="StopPodSandbox for \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\" returns successfully" Dec 13 02:32:37.276793 systemd[1]: run-netns-cni\x2d738c86d0\x2d3c3f\x2d57f6\x2d251c\x2dae0cbfde2dd5.mount: Deactivated successfully. Dec 13 02:32:37.284885 systemd[1]: run-netns-cni\x2d90ff34ed\x2d066a\x2d590d\x2de6b7\x2d32ed9ebff2f9.mount: Deactivated successfully. Dec 13 02:32:37.338524 env[1256]: time="2024-12-13T02:32:37.338496325Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-xkmf7,Uid:b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7,Namespace:kube-system,Attempt:1,}" Dec 13 02:32:37.421512 env[1256]: time="2024-12-13T02:32:37.421484149Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f6fd9c6dd-9s8w5,Uid:0b579c6e-3d61-42ac-9ad3-a083377b25bd,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:32:37.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.105:22-147.75.109.163:53206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:37.521405 kernel: kauditd_printk_skb: 108 callbacks suppressed Dec 13 02:32:37.546674 kernel: audit: type=1130 audit(1734057157.496:1349): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.105:22-147.75.109.163:53206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:37.497653 systemd[1]: Started sshd@8-139.178.70.105:22-147.75.109.163:53206.service. Dec 13 02:32:37.763629 kubelet[2118]: I1213 02:32:37.763590 2118 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-7z7tl" podStartSLOduration=69.269705546 podStartE2EDuration="1m16.763574304s" podCreationTimestamp="2024-12-13 02:31:21 +0000 UTC" firstStartedPulling="2024-12-13 02:32:28.476264191 +0000 UTC m=+80.455366654" lastFinishedPulling="2024-12-13 02:32:35.970132943 +0000 UTC m=+87.949235412" observedRunningTime="2024-12-13 02:32:37.756837952 +0000 UTC m=+89.735940423" watchObservedRunningTime="2024-12-13 02:32:37.763574304 +0000 UTC m=+89.742676772" Dec 13 02:32:37.809325 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:32:37.809400 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali46b7a9efd4d: link becomes ready Dec 13 02:32:37.815919 systemd-networkd[1062]: cali46b7a9efd4d: Link UP Dec 13 02:32:37.816019 systemd-networkd[1062]: cali46b7a9efd4d: Gained carrier Dec 13 02:32:37.830081 env[1256]: 2024-12-13 02:32:37.466 [INFO][4978] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0 coredns-6f6b679f8f- kube-system b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7 1002 0 2024-12-13 02:31:13 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-xkmf7 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali46b7a9efd4d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff" Namespace="kube-system" Pod="coredns-6f6b679f8f-xkmf7" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xkmf7-" Dec 13 02:32:37.830081 env[1256]: 2024-12-13 02:32:37.466 [INFO][4978] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff" Namespace="kube-system" Pod="coredns-6f6b679f8f-xkmf7" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0" Dec 13 02:32:37.830081 env[1256]: 2024-12-13 02:32:37.535 [INFO][4999] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff" HandleID="k8s-pod-network.a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff" Workload="localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0" Dec 13 02:32:37.830081 env[1256]: 2024-12-13 02:32:37.629 [INFO][4999] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff" HandleID="k8s-pod-network.a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff" Workload="localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318fd0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-xkmf7", "timestamp":"2024-12-13 02:32:37.535884905 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:32:37.830081 env[1256]: 2024-12-13 02:32:37.629 [INFO][4999] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:32:37.830081 env[1256]: 2024-12-13 02:32:37.629 [INFO][4999] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:32:37.830081 env[1256]: 2024-12-13 02:32:37.629 [INFO][4999] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:32:37.830081 env[1256]: 2024-12-13 02:32:37.631 [INFO][4999] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff" host="localhost" Dec 13 02:32:37.830081 env[1256]: 2024-12-13 02:32:37.762 [INFO][4999] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:32:37.830081 env[1256]: 2024-12-13 02:32:37.765 [INFO][4999] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:32:37.830081 env[1256]: 2024-12-13 02:32:37.766 [INFO][4999] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:32:37.830081 env[1256]: 2024-12-13 02:32:37.767 [INFO][4999] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:32:37.830081 env[1256]: 2024-12-13 02:32:37.767 [INFO][4999] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff" host="localhost" Dec 13 02:32:37.830081 env[1256]: 2024-12-13 02:32:37.768 [INFO][4999] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff Dec 13 02:32:37.830081 env[1256]: 2024-12-13 02:32:37.772 [INFO][4999] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff" host="localhost" Dec 13 02:32:37.830081 env[1256]: 2024-12-13 02:32:37.791 [INFO][4999] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff" host="localhost" Dec 13 02:32:37.830081 env[1256]: 2024-12-13 02:32:37.791 [INFO][4999] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff" host="localhost" Dec 13 02:32:37.830081 env[1256]: 2024-12-13 02:32:37.791 [INFO][4999] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:32:37.830081 env[1256]: 2024-12-13 02:32:37.792 [INFO][4999] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff" HandleID="k8s-pod-network.a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff" Workload="localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0" Dec 13 02:32:37.836954 env[1256]: 2024-12-13 02:32:37.793 [INFO][4978] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff" Namespace="kube-system" Pod="coredns-6f6b679f8f-xkmf7" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-xkmf7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali46b7a9efd4d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:32:37.836954 env[1256]: 2024-12-13 02:32:37.793 [INFO][4978] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff" Namespace="kube-system" Pod="coredns-6f6b679f8f-xkmf7" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0" Dec 13 02:32:37.836954 env[1256]: 2024-12-13 02:32:37.793 [INFO][4978] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali46b7a9efd4d ContainerID="a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff" Namespace="kube-system" Pod="coredns-6f6b679f8f-xkmf7" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0" Dec 13 02:32:37.836954 env[1256]: 2024-12-13 02:32:37.819 [INFO][4978] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff" Namespace="kube-system" Pod="coredns-6f6b679f8f-xkmf7" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0" Dec 13 02:32:37.836954 env[1256]: 2024-12-13 02:32:37.819 [INFO][4978] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff" Namespace="kube-system" Pod="coredns-6f6b679f8f-xkmf7" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff", Pod:"coredns-6f6b679f8f-xkmf7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali46b7a9efd4d", MAC:"ca:0f:c6:cc:35:77", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:32:37.836954 env[1256]: 2024-12-13 02:32:37.828 [INFO][4978] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff" Namespace="kube-system" Pod="coredns-6f6b679f8f-xkmf7" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0" Dec 13 02:32:37.851804 env[1256]: time="2024-12-13T02:32:37.851753849Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:32:37.851892 env[1256]: time="2024-12-13T02:32:37.851814557Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:32:37.855617 env[1256]: time="2024-12-13T02:32:37.855580756Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:32:37.855757 env[1256]: time="2024-12-13T02:32:37.855729698Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff pid=5031 runtime=io.containerd.runc.v2 Dec 13 02:32:37.867270 systemd[1]: Started cri-containerd-a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff.scope. Dec 13 02:32:37.910633 kernel: audit: type=1400 audit(1734057157.904:1350): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.910691 kernel: audit: type=1400 audit(1734057157.904:1351): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.910719 kernel: audit: type=1400 audit(1734057157.904:1352): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.922583 kernel: audit: type=1400 audit(1734057157.904:1353): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.922643 kernel: audit: type=1400 audit(1734057157.904:1354): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.928234 kernel: audit: type=1400 audit(1734057157.904:1355): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.928147 systemd-resolved[1204]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:32:37.936041 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8be2dad0f35: link becomes ready Dec 13 02:32:37.936110 kernel: audit: type=1400 audit(1734057157.904:1356): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.936135 kernel: audit: type=1400 audit(1734057157.904:1357): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.936154 kernel: audit: type=1400 audit(1734057157.904:1358): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.929718 systemd-networkd[1062]: cali8be2dad0f35: Link UP Dec 13 02:32:37.929868 systemd-networkd[1062]: cali8be2dad0f35: Gained carrier Dec 13 02:32:37.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.910000 audit: BPF prog-id=211 op=LOAD Dec 13 02:32:37.910000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.910000 audit[5045]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=5031 pid=5045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:37.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133323139363435366161323437666238396636316238663838396538 Dec 13 02:32:37.910000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.910000 audit[5045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=5031 pid=5045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:37.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133323139363435366161323437666238396636316238663838396538 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit: BPF prog-id=212 op=LOAD Dec 13 02:32:37.912000 audit[5045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003769d0 items=0 ppid=5031 pid=5045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:37.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133323139363435366161323437666238396636316238663838396538 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit: BPF prog-id=213 op=LOAD Dec 13 02:32:37.912000 audit[5045]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000376a18 items=0 ppid=5031 pid=5045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:37.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133323139363435366161323437666238396636316238663838396538 Dec 13 02:32:37.912000 audit: BPF prog-id=213 op=UNLOAD Dec 13 02:32:37.912000 audit: BPF prog-id=212 op=UNLOAD Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { perfmon } for pid=5045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit[5045]: AVC avc: denied { bpf } for pid=5045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:37.912000 audit: BPF prog-id=214 op=LOAD Dec 13 02:32:37.912000 audit[5045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000376e28 items=0 ppid=5031 pid=5045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:37.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133323139363435366161323437666238396636316238663838396538 Dec 13 02:32:37.951014 env[1256]: 2024-12-13 02:32:37.553 [INFO][4987] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0 calico-apiserver-5f6fd9c6dd- calico-apiserver 0b579c6e-3d61-42ac-9ad3-a083377b25bd 1001 0 2024-12-13 02:31:21 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5f6fd9c6dd projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5f6fd9c6dd-9s8w5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8be2dad0f35 [] []}} ContainerID="be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648" Namespace="calico-apiserver" Pod="calico-apiserver-5f6fd9c6dd-9s8w5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-" Dec 13 02:32:37.951014 env[1256]: 2024-12-13 02:32:37.553 [INFO][4987] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648" Namespace="calico-apiserver" Pod="calico-apiserver-5f6fd9c6dd-9s8w5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0" Dec 13 02:32:37.951014 env[1256]: 2024-12-13 02:32:37.583 [INFO][5007] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648" HandleID="k8s-pod-network.be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0" Dec 13 02:32:37.951014 env[1256]: 2024-12-13 02:32:37.630 [INFO][5007] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648" HandleID="k8s-pod-network.be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051ce0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5f6fd9c6dd-9s8w5", "timestamp":"2024-12-13 02:32:37.583076117 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:32:37.951014 env[1256]: 2024-12-13 02:32:37.631 [INFO][5007] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:32:37.951014 env[1256]: 2024-12-13 02:32:37.791 [INFO][5007] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:32:37.951014 env[1256]: 2024-12-13 02:32:37.792 [INFO][5007] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:32:37.951014 env[1256]: 2024-12-13 02:32:37.840 [INFO][5007] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648" host="localhost" Dec 13 02:32:37.951014 env[1256]: 2024-12-13 02:32:37.870 [INFO][5007] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:32:37.951014 env[1256]: 2024-12-13 02:32:37.891 [INFO][5007] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:32:37.951014 env[1256]: 2024-12-13 02:32:37.893 [INFO][5007] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:32:37.951014 env[1256]: 2024-12-13 02:32:37.895 [INFO][5007] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:32:37.951014 env[1256]: 2024-12-13 02:32:37.895 [INFO][5007] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648" host="localhost" Dec 13 02:32:37.951014 env[1256]: 2024-12-13 02:32:37.896 [INFO][5007] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648 Dec 13 02:32:37.951014 env[1256]: 2024-12-13 02:32:37.903 [INFO][5007] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648" host="localhost" Dec 13 02:32:37.951014 env[1256]: 2024-12-13 02:32:37.915 [INFO][5007] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648" host="localhost" Dec 13 02:32:37.951014 env[1256]: 2024-12-13 02:32:37.915 [INFO][5007] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648" host="localhost" Dec 13 02:32:37.951014 env[1256]: 2024-12-13 02:32:37.915 [INFO][5007] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:32:37.951014 env[1256]: 2024-12-13 02:32:37.916 [INFO][5007] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648" HandleID="k8s-pod-network.be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0" Dec 13 02:32:37.959748 env[1256]: 2024-12-13 02:32:37.922 [INFO][4987] cni-plugin/k8s.go 386: Populated endpoint ContainerID="be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648" Namespace="calico-apiserver" Pod="calico-apiserver-5f6fd9c6dd-9s8w5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0", GenerateName:"calico-apiserver-5f6fd9c6dd-", Namespace:"calico-apiserver", SelfLink:"", UID:"0b579c6e-3d61-42ac-9ad3-a083377b25bd", ResourceVersion:"1001", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f6fd9c6dd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5f6fd9c6dd-9s8w5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8be2dad0f35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:32:37.959748 env[1256]: 2024-12-13 02:32:37.923 [INFO][4987] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648" Namespace="calico-apiserver" Pod="calico-apiserver-5f6fd9c6dd-9s8w5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0" Dec 13 02:32:37.959748 env[1256]: 2024-12-13 02:32:37.923 [INFO][4987] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8be2dad0f35 ContainerID="be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648" Namespace="calico-apiserver" Pod="calico-apiserver-5f6fd9c6dd-9s8w5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0" Dec 13 02:32:37.959748 env[1256]: 2024-12-13 02:32:37.929 [INFO][4987] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648" Namespace="calico-apiserver" Pod="calico-apiserver-5f6fd9c6dd-9s8w5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0" Dec 13 02:32:37.959748 env[1256]: 2024-12-13 02:32:37.930 [INFO][4987] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648" Namespace="calico-apiserver" Pod="calico-apiserver-5f6fd9c6dd-9s8w5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0", GenerateName:"calico-apiserver-5f6fd9c6dd-", Namespace:"calico-apiserver", SelfLink:"", UID:"0b579c6e-3d61-42ac-9ad3-a083377b25bd", ResourceVersion:"1001", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f6fd9c6dd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648", Pod:"calico-apiserver-5f6fd9c6dd-9s8w5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8be2dad0f35", MAC:"9a:c7:cc:29:0d:ea", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:32:37.959748 env[1256]: 2024-12-13 02:32:37.940 [INFO][4987] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648" Namespace="calico-apiserver" Pod="calico-apiserver-5f6fd9c6dd-9s8w5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0" Dec 13 02:32:37.977830 env[1256]: time="2024-12-13T02:32:37.977034699Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:32:37.977830 env[1256]: time="2024-12-13T02:32:37.977057610Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:32:37.977830 env[1256]: time="2024-12-13T02:32:37.977064504Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:32:37.977830 env[1256]: time="2024-12-13T02:32:37.977201946Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648 pid=5086 runtime=io.containerd.runc.v2 Dec 13 02:32:37.990381 systemd[1]: Started cri-containerd-be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648.scope. Dec 13 02:32:37.992360 env[1256]: time="2024-12-13T02:32:37.992336898Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-xkmf7,Uid:b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7,Namespace:kube-system,Attempt:1,} returns sandbox id \"a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff\"" Dec 13 02:32:38.005000 audit[5124]: NETFILTER_CFG table=filter:112 family=2 entries=38 op=nft_register_chain pid=5124 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:32:38.005000 audit[5124]: SYSCALL arch=c000003e syscall=46 success=yes exit=19392 a0=3 a1=7fff24dd3ec0 a2=0 a3=7fff24dd3eac items=0 ppid=4177 pid=5124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.005000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:32:38.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit: BPF prog-id=215 op=LOAD Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[5098]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5086 pid=5098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265346663363333373264373431646563353535353664316235336664 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[5098]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5086 pid=5098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265346663363333373264373431646563353535353664316235336664 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit: BPF prog-id=216 op=LOAD Dec 13 02:32:38.013000 audit[5098]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00035abe0 items=0 ppid=5086 pid=5098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265346663363333373264373431646563353535353664316235336664 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.013000 audit: BPF prog-id=217 op=LOAD Dec 13 02:32:38.013000 audit[5098]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00035ac28 items=0 ppid=5086 pid=5098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265346663363333373264373431646563353535353664316235336664 Dec 13 02:32:38.014000 audit: BPF prog-id=217 op=UNLOAD Dec 13 02:32:38.014000 audit: BPF prog-id=216 op=UNLOAD Dec 13 02:32:38.014000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.014000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.014000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.014000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.014000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.014000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.014000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.014000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.014000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.014000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.014000 audit: BPF prog-id=218 op=LOAD Dec 13 02:32:38.014000 audit[5098]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00035b038 items=0 ppid=5086 pid=5098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265346663363333373264373431646563353535353664316235336664 Dec 13 02:32:38.017262 systemd-resolved[1204]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:32:38.028411 sshd[4997]: Accepted publickey for core from 147.75.109.163 port 53206 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:32:38.027000 audit[4997]: USER_ACCT pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:38.028000 audit[4997]: CRED_ACQ pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:38.028000 audit[4997]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff05df59e0 a2=3 a3=0 items=0 ppid=1 pid=4997 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.028000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:38.033307 env[1256]: time="2024-12-13T02:32:38.033284220Z" level=info msg="CreateContainer within sandbox \"a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:32:38.033543 sshd[4997]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:38.032000 audit[5128]: NETFILTER_CFG table=filter:113 family=2 entries=46 op=nft_register_chain pid=5128 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:32:38.032000 audit[5128]: SYSCALL arch=c000003e syscall=46 success=yes exit=23876 a0=3 a1=7ffcfc66e500 a2=0 a3=7ffcfc66e4ec items=0 ppid=4177 pid=5128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.032000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:32:38.039695 systemd[1]: Started session-11.scope. Dec 13 02:32:38.042192 systemd-logind[1241]: New session 11 of user core. Dec 13 02:32:38.049000 audit[4997]: USER_START pid=4997 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:38.050000 audit[5129]: CRED_ACQ pid=5129 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:38.058342 env[1256]: time="2024-12-13T02:32:38.057929059Z" level=info msg="CreateContainer within sandbox \"a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"358c226fe12adc95a82f29f8f1d1762a16dcf41b15d34a217d8d6897aa623f0f\"" Dec 13 02:32:38.058576 env[1256]: time="2024-12-13T02:32:38.058561736Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f6fd9c6dd-9s8w5,Uid:0b579c6e-3d61-42ac-9ad3-a083377b25bd,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648\"" Dec 13 02:32:38.058703 env[1256]: time="2024-12-13T02:32:38.058591206Z" level=info msg="StartContainer for \"358c226fe12adc95a82f29f8f1d1762a16dcf41b15d34a217d8d6897aa623f0f\"" Dec 13 02:32:38.061930 env[1256]: time="2024-12-13T02:32:38.061915312Z" level=info msg="CreateContainer within sandbox \"be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:32:38.070683 env[1256]: time="2024-12-13T02:32:38.070603221Z" level=info msg="CreateContainer within sandbox \"be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"f17c0d5adeebd63b2feb9d28ab89fe31535fa64602deb326c55ffb97a90a38e3\"" Dec 13 02:32:38.073917 env[1256]: time="2024-12-13T02:32:38.073875307Z" level=info msg="StartContainer for \"f17c0d5adeebd63b2feb9d28ab89fe31535fa64602deb326c55ffb97a90a38e3\"" Dec 13 02:32:38.080660 systemd[1]: Started cri-containerd-358c226fe12adc95a82f29f8f1d1762a16dcf41b15d34a217d8d6897aa623f0f.scope. Dec 13 02:32:38.093307 systemd[1]: Started cri-containerd-f17c0d5adeebd63b2feb9d28ab89fe31535fa64602deb326c55ffb97a90a38e3.scope. Dec 13 02:32:38.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.103000 audit: BPF prog-id=219 op=LOAD Dec 13 02:32:38.105000 audit[5146]: AVC avc: denied { bpf } for pid=5146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.105000 audit[5146]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5031 pid=5146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335386332323666653132616463393561383266323966386631643137 Dec 13 02:32:38.105000 audit[5146]: AVC avc: denied { perfmon } for pid=5146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.105000 audit[5146]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5031 pid=5146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335386332323666653132616463393561383266323966386631643137 Dec 13 02:32:38.105000 audit[5146]: AVC avc: denied { bpf } for pid=5146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.105000 audit[5146]: AVC avc: denied { bpf } for pid=5146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.105000 audit[5146]: AVC avc: denied { bpf } for pid=5146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.105000 audit[5146]: AVC avc: denied { perfmon } for pid=5146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.105000 audit[5146]: AVC avc: denied { perfmon } for pid=5146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.105000 audit[5146]: AVC avc: denied { perfmon } for pid=5146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.105000 audit[5146]: AVC avc: denied { perfmon } for pid=5146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.105000 audit[5146]: AVC avc: denied { perfmon } for pid=5146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.105000 audit[5146]: AVC avc: denied { bpf } for pid=5146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.105000 audit[5146]: AVC avc: denied { bpf } for pid=5146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.105000 audit: BPF prog-id=220 op=LOAD Dec 13 02:32:38.105000 audit[5146]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000398700 items=0 ppid=5031 pid=5146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335386332323666653132616463393561383266323966386631643137 Dec 13 02:32:38.106000 audit[5146]: AVC avc: denied { bpf } for pid=5146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.106000 audit[5146]: AVC avc: denied { bpf } for pid=5146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.106000 audit[5146]: AVC avc: denied { perfmon } for pid=5146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.106000 audit[5146]: AVC avc: denied { perfmon } for pid=5146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.106000 audit[5146]: AVC avc: denied { perfmon } for pid=5146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.106000 audit[5146]: AVC avc: denied { perfmon } for pid=5146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.106000 audit[5146]: AVC avc: denied { perfmon } for pid=5146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.106000 audit[5146]: AVC avc: denied { bpf } for pid=5146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.106000 audit[5146]: AVC avc: denied { bpf } for pid=5146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.106000 audit: BPF prog-id=221 op=LOAD Dec 13 02:32:38.106000 audit[5146]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000398748 items=0 ppid=5031 pid=5146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335386332323666653132616463393561383266323966386631643137 Dec 13 02:32:38.106000 audit: BPF prog-id=221 op=UNLOAD Dec 13 02:32:38.106000 audit: BPF prog-id=220 op=UNLOAD Dec 13 02:32:38.106000 audit[5146]: AVC avc: denied { bpf } for pid=5146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.106000 audit[5146]: AVC avc: denied { bpf } for pid=5146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.106000 audit[5146]: AVC avc: denied { bpf } for pid=5146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.106000 audit[5146]: AVC avc: denied { perfmon } for pid=5146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.106000 audit[5146]: AVC avc: denied { perfmon } for pid=5146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.106000 audit[5146]: AVC avc: denied { perfmon } for pid=5146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.106000 audit[5146]: AVC avc: denied { perfmon } for pid=5146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.106000 audit[5146]: AVC avc: denied { perfmon } for pid=5146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.106000 audit[5146]: AVC avc: denied { bpf } for pid=5146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.106000 audit[5146]: AVC avc: denied { bpf } for pid=5146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.106000 audit: BPF prog-id=222 op=LOAD Dec 13 02:32:38.106000 audit[5146]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000398b58 items=0 ppid=5031 pid=5146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335386332323666653132616463393561383266323966386631643137 Dec 13 02:32:38.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.125000 audit: BPF prog-id=223 op=LOAD Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=5086 pid=5164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631376330643561646565626436336232666562396432386162383966 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=5086 pid=5164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631376330643561646565626436336232666562396432386162383966 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit: BPF prog-id=224 op=LOAD Dec 13 02:32:38.126000 audit[5164]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c0001f59e0 items=0 ppid=5086 pid=5164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631376330643561646565626436336232666562396432386162383966 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit: BPF prog-id=225 op=LOAD Dec 13 02:32:38.126000 audit[5164]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c0001f5a28 items=0 ppid=5086 pid=5164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631376330643561646565626436336232666562396432386162383966 Dec 13 02:32:38.126000 audit: BPF prog-id=225 op=UNLOAD Dec 13 02:32:38.126000 audit: BPF prog-id=224 op=UNLOAD Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { perfmon } for pid=5164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit[5164]: AVC avc: denied { bpf } for pid=5164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:32:38.126000 audit: BPF prog-id=226 op=LOAD Dec 13 02:32:38.126000 audit[5164]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c0001f5e38 items=0 ppid=5086 pid=5164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631376330643561646565626436336232666562396432386162383966 Dec 13 02:32:38.134139 env[1256]: time="2024-12-13T02:32:38.134098692Z" level=info msg="StartContainer for \"358c226fe12adc95a82f29f8f1d1762a16dcf41b15d34a217d8d6897aa623f0f\" returns successfully" Dec 13 02:32:38.156640 env[1256]: time="2024-12-13T02:32:38.156608736Z" level=info msg="StartContainer for \"f17c0d5adeebd63b2feb9d28ab89fe31535fa64602deb326c55ffb97a90a38e3\" returns successfully" Dec 13 02:32:38.527115 kubelet[2118]: I1213 02:32:38.527080 2118 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-xkmf7" podStartSLOduration=85.527064184 podStartE2EDuration="1m25.527064184s" podCreationTimestamp="2024-12-13 02:31:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:32:38.519697255 +0000 UTC m=+90.498799730" watchObservedRunningTime="2024-12-13 02:32:38.527064184 +0000 UTC m=+90.506166652" Dec 13 02:32:38.592000 audit[5223]: NETFILTER_CFG table=filter:114 family=2 entries=8 op=nft_register_rule pid=5223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:38.592000 audit[5223]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffe86cd1d0 a2=0 a3=7fffe86cd1bc items=0 ppid=2250 pid=5223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.592000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:38.598000 audit[5223]: NETFILTER_CFG table=nat:115 family=2 entries=54 op=nft_register_rule pid=5223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:38.598000 audit[5223]: SYSCALL arch=c000003e syscall=46 success=yes exit=17772 a0=3 a1=7fffe86cd1d0 a2=0 a3=7fffe86cd1bc items=0 ppid=2250 pid=5223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.598000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:38.631000 audit[5225]: NETFILTER_CFG table=filter:116 family=2 entries=8 op=nft_register_rule pid=5225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:38.631000 audit[5225]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe785a2f90 a2=0 a3=7ffe785a2f7c items=0 ppid=2250 pid=5225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.631000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:38.636000 audit[5225]: NETFILTER_CFG table=nat:117 family=2 entries=22 op=nft_register_rule pid=5225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:38.636000 audit[5225]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe785a2f90 a2=0 a3=7ffe785a2f7c items=0 ppid=2250 pid=5225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:38.636000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:38.801000 audit[5183]: AVC avc: denied { watch } for pid=5183 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_31_33.693622009/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c37,c709 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c37,c709 tclass=file permissive=0 Dec 13 02:32:38.801000 audit[5183]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000765580 a2=fc6 a3=0 items=0 ppid=5086 pid=5183 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c37,c709 key=(null) Dec 13 02:32:38.801000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:32:38.863903 kubelet[2118]: I1213 02:32:38.863870 2118 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5f6fd9c6dd-9s8w5" podStartSLOduration=77.863854446 podStartE2EDuration="1m17.863854446s" podCreationTimestamp="2024-12-13 02:31:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:32:38.532527879 +0000 UTC m=+90.511630355" watchObservedRunningTime="2024-12-13 02:32:38.863854446 +0000 UTC m=+90.842956922" Dec 13 02:32:38.897314 sshd[4997]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:38.897000 audit[4997]: USER_END pid=4997 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:38.897000 audit[4997]: CRED_DISP pid=4997 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:38.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.105:22-147.75.109.163:53206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:38.899447 systemd[1]: sshd@8-139.178.70.105:22-147.75.109.163:53206.service: Deactivated successfully. Dec 13 02:32:38.899994 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 02:32:38.901704 systemd-logind[1241]: Session 11 logged out. Waiting for processes to exit. Dec 13 02:32:38.904400 systemd-logind[1241]: Removed session 11. Dec 13 02:32:39.112291 systemd-networkd[1062]: cali46b7a9efd4d: Gained IPv6LL Dec 13 02:32:39.607000 audit[5228]: NETFILTER_CFG table=filter:118 family=2 entries=8 op=nft_register_rule pid=5228 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:39.607000 audit[5228]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff1a2bcd00 a2=0 a3=7fff1a2bccec items=0 ppid=2250 pid=5228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:39.607000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:39.640000 audit[5228]: NETFILTER_CFG table=nat:119 family=2 entries=70 op=nft_register_chain pid=5228 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:32:39.640000 audit[5228]: SYSCALL arch=c000003e syscall=46 success=yes exit=25324 a0=3 a1=7fff1a2bcd00 a2=0 a3=7fff1a2bccec items=0 ppid=2250 pid=5228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:39.640000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:32:39.688331 systemd-networkd[1062]: cali8be2dad0f35: Gained IPv6LL Dec 13 02:32:43.903666 systemd[1]: Started sshd@9-139.178.70.105:22-147.75.109.163:53210.service. Dec 13 02:32:43.908869 kernel: kauditd_printk_skb: 256 callbacks suppressed Dec 13 02:32:43.913029 kernel: audit: type=1130 audit(1734057163.902:1439): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.105:22-147.75.109.163:53210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:43.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.105:22-147.75.109.163:53210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:43.994000 audit[5254]: USER_ACCT pid=5254 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:43.996031 sshd[5254]: Accepted publickey for core from 147.75.109.163 port 53210 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:32:44.000327 kernel: audit: type=1101 audit(1734057163.994:1440): pid=5254 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:44.001000 audit[5254]: CRED_ACQ pid=5254 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:44.005175 sshd[5254]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:44.007620 kernel: audit: type=1103 audit(1734057164.001:1441): pid=5254 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:44.007727 kernel: audit: type=1006 audit(1734057164.001:1442): pid=5254 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 02:32:44.001000 audit[5254]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeb953a50 a2=3 a3=0 items=0 ppid=1 pid=5254 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:44.011399 kernel: audit: type=1300 audit(1734057164.001:1442): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeb953a50 a2=3 a3=0 items=0 ppid=1 pid=5254 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:44.001000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:44.012777 kernel: audit: type=1327 audit(1734057164.001:1442): proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:44.020832 systemd-logind[1241]: New session 12 of user core. Dec 13 02:32:44.021825 systemd[1]: Started session-12.scope. Dec 13 02:32:44.024000 audit[5254]: USER_START pid=5254 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:44.025000 audit[5256]: CRED_ACQ pid=5256 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:44.032874 kernel: audit: type=1105 audit(1734057164.024:1443): pid=5254 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:44.033242 kernel: audit: type=1103 audit(1734057164.025:1444): pid=5256 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:44.350980 sshd[5254]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:44.353056 systemd[1]: Started sshd@10-139.178.70.105:22-147.75.109.163:53224.service. Dec 13 02:32:44.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.105:22-147.75.109.163:53224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:44.361609 kernel: audit: type=1130 audit(1734057164.352:1445): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.105:22-147.75.109.163:53224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:44.361645 kernel: audit: type=1106 audit(1734057164.355:1446): pid=5254 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:44.355000 audit[5254]: USER_END pid=5254 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:44.356000 audit[5254]: CRED_DISP pid=5254 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:44.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.105:22-147.75.109.163:53210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:44.358161 systemd[1]: sshd@9-139.178.70.105:22-147.75.109.163:53210.service: Deactivated successfully. Dec 13 02:32:44.358665 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 02:32:44.361274 systemd-logind[1241]: Session 12 logged out. Waiting for processes to exit. Dec 13 02:32:44.361922 systemd-logind[1241]: Removed session 12. Dec 13 02:32:44.481000 audit[5265]: USER_ACCT pid=5265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:44.482000 audit[5265]: CRED_ACQ pid=5265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:44.482000 audit[5265]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc284a31d0 a2=3 a3=0 items=0 ppid=1 pid=5265 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:44.482000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:44.490000 audit[5265]: USER_START pid=5265 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:44.492000 audit[5268]: CRED_ACQ pid=5268 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:44.494387 sshd[5265]: Accepted publickey for core from 147.75.109.163 port 53224 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:32:44.483638 sshd[5265]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:44.487728 systemd[1]: Started session-13.scope. Dec 13 02:32:44.488228 systemd-logind[1241]: New session 13 of user core. Dec 13 02:32:45.002657 sshd[5265]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:45.002000 audit[5265]: USER_END pid=5265 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:45.002000 audit[5265]: CRED_DISP pid=5265 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:45.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.105:22-147.75.109.163:53226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:45.005619 systemd[1]: Started sshd@11-139.178.70.105:22-147.75.109.163:53226.service. Dec 13 02:32:45.007478 systemd[1]: sshd@10-139.178.70.105:22-147.75.109.163:53224.service: Deactivated successfully. Dec 13 02:32:45.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.105:22-147.75.109.163:53224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:45.008042 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 02:32:45.008580 systemd-logind[1241]: Session 13 logged out. Waiting for processes to exit. Dec 13 02:32:45.009192 systemd-logind[1241]: Removed session 13. Dec 13 02:32:45.037000 audit[5276]: USER_ACCT pid=5276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:45.039281 sshd[5276]: Accepted publickey for core from 147.75.109.163 port 53226 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:32:45.039000 audit[5276]: CRED_ACQ pid=5276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:45.039000 audit[5276]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2426de00 a2=3 a3=0 items=0 ppid=1 pid=5276 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:45.039000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:45.040475 sshd[5276]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:45.043232 systemd-logind[1241]: New session 14 of user core. Dec 13 02:32:45.043861 systemd[1]: Started session-14.scope. Dec 13 02:32:45.047000 audit[5276]: USER_START pid=5276 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:45.048000 audit[5279]: CRED_ACQ pid=5279 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:45.155316 sshd[5276]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:45.155000 audit[5276]: USER_END pid=5276 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:45.155000 audit[5276]: CRED_DISP pid=5276 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:45.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.105:22-147.75.109.163:53226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:45.157373 systemd-logind[1241]: Session 14 logged out. Waiting for processes to exit. Dec 13 02:32:45.157491 systemd[1]: sshd@11-139.178.70.105:22-147.75.109.163:53226.service: Deactivated successfully. Dec 13 02:32:45.157940 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 02:32:45.158456 systemd-logind[1241]: Removed session 14. Dec 13 02:32:50.160621 systemd[1]: Started sshd@12-139.178.70.105:22-147.75.109.163:39542.service. Dec 13 02:32:50.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.105:22-147.75.109.163:39542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:50.162233 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 02:32:50.162298 kernel: audit: type=1130 audit(1734057170.159:1466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.105:22-147.75.109.163:39542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:50.499444 sshd[5302]: Accepted publickey for core from 147.75.109.163 port 39542 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:32:50.508928 kernel: audit: type=1101 audit(1734057170.498:1467): pid=5302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:50.498000 audit[5302]: USER_ACCT pid=5302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:50.525000 audit[5302]: CRED_ACQ pid=5302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:50.551115 kernel: audit: type=1103 audit(1734057170.525:1468): pid=5302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:50.551191 kernel: audit: type=1006 audit(1734057170.525:1469): pid=5302 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 02:32:50.551217 kernel: audit: type=1300 audit(1734057170.525:1469): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeac072a60 a2=3 a3=0 items=0 ppid=1 pid=5302 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.588328 kernel: audit: type=1327 audit(1734057170.525:1469): proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:50.525000 audit[5302]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeac072a60 a2=3 a3=0 items=0 ppid=1 pid=5302 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:50.525000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:50.588455 sshd[5302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:50.749135 systemd[1]: Started session-15.scope. Dec 13 02:32:50.766098 kernel: audit: type=1105 audit(1734057170.751:1470): pid=5302 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:50.766192 kernel: audit: type=1103 audit(1734057170.751:1471): pid=5304 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:50.751000 audit[5302]: USER_START pid=5302 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:50.751000 audit[5304]: CRED_ACQ pid=5304 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:50.749474 systemd-logind[1241]: New session 15 of user core. Dec 13 02:32:51.658878 sshd[5302]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:51.671000 audit[5302]: USER_END pid=5302 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:51.677198 kernel: audit: type=1106 audit(1734057171.671:1472): pid=5302 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:51.676000 audit[5302]: CRED_DISP pid=5302 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:51.681501 kernel: audit: type=1104 audit(1734057171.676:1473): pid=5302 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:51.682479 systemd-logind[1241]: Session 15 logged out. Waiting for processes to exit. Dec 13 02:32:51.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.105:22-147.75.109.163:39542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:51.683840 systemd[1]: sshd@12-139.178.70.105:22-147.75.109.163:39542.service: Deactivated successfully. Dec 13 02:32:51.684393 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 02:32:51.684939 systemd-logind[1241]: Removed session 15. Dec 13 02:32:52.231668 systemd[1]: run-containerd-runc-k8s.io-7171a5edbbc375e7652eff3c52e4f402fd7be2d4a7d6c45d439806b202cb4155-runc.uslQZ1.mount: Deactivated successfully. Dec 13 02:32:53.227899 systemd[1]: run-containerd-runc-k8s.io-1d2d74af35d9bc770841d77c7bab8380d4620cfbe1a2451cde9c2732385d49b4-runc.m74nQq.mount: Deactivated successfully. Dec 13 02:32:56.662216 systemd[1]: Started sshd@13-139.178.70.105:22-147.75.109.163:51916.service. Dec 13 02:32:56.673720 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:32:56.675532 kernel: audit: type=1130 audit(1734057176.661:1475): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.105:22-147.75.109.163:51916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:56.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.105:22-147.75.109.163:51916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:57.157041 sshd[5374]: Accepted publickey for core from 147.75.109.163 port 51916 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:32:57.170229 kernel: audit: type=1101 audit(1734057177.155:1476): pid=5374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:57.170268 kernel: audit: type=1103 audit(1734057177.165:1477): pid=5374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:57.155000 audit[5374]: USER_ACCT pid=5374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:57.165000 audit[5374]: CRED_ACQ pid=5374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:57.165000 audit[5374]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc92fec830 a2=3 a3=0 items=0 ppid=1 pid=5374 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:57.182867 kernel: audit: type=1006 audit(1734057177.165:1478): pid=5374 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 02:32:57.182899 kernel: audit: type=1300 audit(1734057177.165:1478): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc92fec830 a2=3 a3=0 items=0 ppid=1 pid=5374 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:32:57.188310 kernel: audit: type=1327 audit(1734057177.165:1478): proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:57.165000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:32:57.189300 sshd[5374]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:32:57.208150 systemd-logind[1241]: New session 16 of user core. Dec 13 02:32:57.232954 kernel: audit: type=1105 audit(1734057177.210:1479): pid=5374 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:57.237935 kernel: audit: type=1103 audit(1734057177.215:1480): pid=5376 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:57.210000 audit[5374]: USER_START pid=5374 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:57.215000 audit[5376]: CRED_ACQ pid=5376 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:57.208744 systemd[1]: Started session-16.scope. Dec 13 02:32:58.853892 sshd[5374]: pam_unix(sshd:session): session closed for user core Dec 13 02:32:58.859000 audit[5374]: USER_END pid=5374 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:58.862000 audit[5374]: CRED_DISP pid=5374 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:58.867648 kernel: audit: type=1106 audit(1734057178.859:1481): pid=5374 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:58.868517 kernel: audit: type=1104 audit(1734057178.862:1482): pid=5374 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:32:58.867898 systemd[1]: sshd@13-139.178.70.105:22-147.75.109.163:51916.service: Deactivated successfully. Dec 13 02:32:58.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.105:22-147.75.109.163:51916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:32:58.868394 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 02:32:58.869156 systemd-logind[1241]: Session 16 logged out. Waiting for processes to exit. Dec 13 02:32:58.869793 systemd-logind[1241]: Removed session 16. Dec 13 02:33:03.829000 audit[1967]: AVC avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:33:03.899834 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:33:03.899999 kernel: audit: type=1400 audit(1734057183.829:1485): avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:33:03.900065 kernel: audit: type=1400 audit(1734057183.829:1484): avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:33:03.900084 kernel: audit: type=1300 audit(1734057183.829:1484): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003099a20 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:33:03.900099 kernel: audit: type=1327 audit(1734057183.829:1484): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:33:03.900118 kernel: audit: type=1300 audit(1734057183.829:1485): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003216c30 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:33:03.900136 kernel: audit: type=1327 audit(1734057183.829:1485): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:33:03.900175 kernel: audit: type=1130 audit(1734057183.856:1486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.105:22-147.75.109.163:51924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:03.829000 audit[1967]: AVC avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:33:03.829000 audit[1967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003099a20 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:33:03.829000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:33:03.829000 audit[1967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003216c30 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:33:03.829000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:33:03.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.105:22-147.75.109.163:51924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:03.857857 systemd[1]: Started sshd@14-139.178.70.105:22-147.75.109.163:51924.service. Dec 13 02:33:03.946000 audit[5393]: USER_ACCT pid=5393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:03.948764 sshd[5393]: Accepted publickey for core from 147.75.109.163 port 51924 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:33:03.951000 audit[5393]: CRED_ACQ pid=5393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:03.952160 sshd[5393]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:33:03.954945 kernel: audit: type=1101 audit(1734057183.946:1487): pid=5393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:03.955037 kernel: audit: type=1103 audit(1734057183.951:1488): pid=5393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:03.955529 kernel: audit: type=1006 audit(1734057183.951:1489): pid=5393 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 02:33:03.951000 audit[5393]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1c746a30 a2=3 a3=0 items=0 ppid=1 pid=5393 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:03.951000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:33:03.961000 audit[5393]: USER_START pid=5393 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:03.962000 audit[5395]: CRED_ACQ pid=5395 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:03.958428 systemd[1]: Started session-17.scope. Dec 13 02:33:03.959235 systemd-logind[1241]: New session 17 of user core. Dec 13 02:33:04.197953 sshd[5393]: pam_unix(sshd:session): session closed for user core Dec 13 02:33:04.197000 audit[5393]: USER_END pid=5393 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:04.197000 audit[5393]: CRED_DISP pid=5393 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:04.199852 systemd-logind[1241]: Session 17 logged out. Waiting for processes to exit. Dec 13 02:33:04.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.105:22-147.75.109.163:51924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:04.200936 systemd[1]: sshd@14-139.178.70.105:22-147.75.109.163:51924.service: Deactivated successfully. Dec 13 02:33:04.201459 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 02:33:04.202349 systemd-logind[1241]: Removed session 17. Dec 13 02:33:05.153000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:33:05.153000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:33:05.153000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c01186a220 a2=fc6 a3=0 items=0 ppid=1821 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 key=(null) Dec 13 02:33:05.153000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:33:05.153000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c011c4e750 a2=fc6 a3=0 items=0 ppid=1821 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 key=(null) Dec 13 02:33:05.153000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:33:05.153000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:33:05.153000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0114fd0c0 a2=fc6 a3=0 items=0 ppid=1821 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 key=(null) Dec 13 02:33:05.153000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:33:05.156000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:33:05.156000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c011c4e7b0 a2=fc6 a3=0 items=0 ppid=1821 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 key=(null) Dec 13 02:33:05.156000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:33:05.156000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7294 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:33:05.156000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c011c4e840 a2=fc6 a3=0 items=0 ppid=1821 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 key=(null) Dec 13 02:33:05.156000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:33:05.157000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:33:05.157000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c01165c090 a2=fc6 a3=0 items=0 ppid=1821 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c84,c193 key=(null) Dec 13 02:33:05.157000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313035002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:33:08.243143 env[1256]: time="2024-12-13T02:33:08.243039531Z" level=info msg="StopPodSandbox for \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\"" Dec 13 02:33:08.801222 env[1256]: 2024-12-13 02:33:08.564 [WARNING][5425] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0", GenerateName:"calico-kube-controllers-7755b4b488-", Namespace:"calico-system", SelfLink:"", UID:"bcfd5457-45d1-48e8-ab9b-a02effca276a", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7755b4b488", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f", Pod:"calico-kube-controllers-7755b4b488-k842l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califdeaec08be0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:08.801222 env[1256]: 2024-12-13 02:33:08.569 [INFO][5425] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Dec 13 02:33:08.801222 env[1256]: 2024-12-13 02:33:08.569 [INFO][5425] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" iface="eth0" netns="" Dec 13 02:33:08.801222 env[1256]: 2024-12-13 02:33:08.569 [INFO][5425] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Dec 13 02:33:08.801222 env[1256]: 2024-12-13 02:33:08.569 [INFO][5425] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Dec 13 02:33:08.801222 env[1256]: 2024-12-13 02:33:08.775 [INFO][5431] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" HandleID="k8s-pod-network.492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Workload="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0" Dec 13 02:33:08.801222 env[1256]: 2024-12-13 02:33:08.778 [INFO][5431] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:08.801222 env[1256]: 2024-12-13 02:33:08.779 [INFO][5431] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:08.801222 env[1256]: 2024-12-13 02:33:08.796 [WARNING][5431] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" HandleID="k8s-pod-network.492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Workload="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0" Dec 13 02:33:08.801222 env[1256]: 2024-12-13 02:33:08.797 [INFO][5431] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" HandleID="k8s-pod-network.492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Workload="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0" Dec 13 02:33:08.801222 env[1256]: 2024-12-13 02:33:08.798 [INFO][5431] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:08.801222 env[1256]: 2024-12-13 02:33:08.800 [INFO][5425] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Dec 13 02:33:08.810623 env[1256]: time="2024-12-13T02:33:08.801244429Z" level=info msg="TearDown network for sandbox \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\" successfully" Dec 13 02:33:08.810623 env[1256]: time="2024-12-13T02:33:08.801269414Z" level=info msg="StopPodSandbox for \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\" returns successfully" Dec 13 02:33:08.817338 env[1256]: time="2024-12-13T02:33:08.817311503Z" level=info msg="RemovePodSandbox for \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\"" Dec 13 02:33:08.817422 env[1256]: time="2024-12-13T02:33:08.817338754Z" level=info msg="Forcibly stopping sandbox \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\"" Dec 13 02:33:08.924994 env[1256]: 2024-12-13 02:33:08.895 [WARNING][5451] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0", GenerateName:"calico-kube-controllers-7755b4b488-", Namespace:"calico-system", SelfLink:"", UID:"bcfd5457-45d1-48e8-ab9b-a02effca276a", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7755b4b488", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aac6546823145ca8e8ffde933921a3d5983283dcd78d7c02738f559de60c780f", Pod:"calico-kube-controllers-7755b4b488-k842l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califdeaec08be0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:08.924994 env[1256]: 2024-12-13 02:33:08.895 [INFO][5451] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Dec 13 02:33:08.924994 env[1256]: 2024-12-13 02:33:08.895 [INFO][5451] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" iface="eth0" netns="" Dec 13 02:33:08.924994 env[1256]: 2024-12-13 02:33:08.895 [INFO][5451] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Dec 13 02:33:08.924994 env[1256]: 2024-12-13 02:33:08.895 [INFO][5451] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Dec 13 02:33:08.924994 env[1256]: 2024-12-13 02:33:08.917 [INFO][5458] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" HandleID="k8s-pod-network.492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Workload="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0" Dec 13 02:33:08.924994 env[1256]: 2024-12-13 02:33:08.917 [INFO][5458] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:08.924994 env[1256]: 2024-12-13 02:33:08.917 [INFO][5458] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:08.924994 env[1256]: 2024-12-13 02:33:08.920 [WARNING][5458] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" HandleID="k8s-pod-network.492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Workload="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0" Dec 13 02:33:08.924994 env[1256]: 2024-12-13 02:33:08.920 [INFO][5458] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" HandleID="k8s-pod-network.492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Workload="localhost-k8s-calico--kube--controllers--7755b4b488--k842l-eth0" Dec 13 02:33:08.924994 env[1256]: 2024-12-13 02:33:08.921 [INFO][5458] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:08.924994 env[1256]: 2024-12-13 02:33:08.923 [INFO][5451] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a" Dec 13 02:33:08.927629 env[1256]: time="2024-12-13T02:33:08.925255363Z" level=info msg="TearDown network for sandbox \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\" successfully" Dec 13 02:33:08.929894 env[1256]: time="2024-12-13T02:33:08.929878277Z" level=info msg="RemovePodSandbox \"492d7d611e4885629de282efef7c4e7d7e103de052b515801ca7e1a34263ab4a\" returns successfully" Dec 13 02:33:08.931236 env[1256]: time="2024-12-13T02:33:08.931215298Z" level=info msg="StopPodSandbox for \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\"" Dec 13 02:33:08.998953 env[1256]: 2024-12-13 02:33:08.965 [WARNING][5477] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--7z7tl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"47c64936-f63c-409a-acf6-791447c02a65", ResourceVersion:"1013", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c", Pod:"csi-node-driver-7z7tl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali315e6b2065c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:08.998953 env[1256]: 2024-12-13 02:33:08.965 [INFO][5477] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Dec 13 02:33:08.998953 env[1256]: 2024-12-13 02:33:08.965 [INFO][5477] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" iface="eth0" netns="" Dec 13 02:33:08.998953 env[1256]: 2024-12-13 02:33:08.965 [INFO][5477] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Dec 13 02:33:08.998953 env[1256]: 2024-12-13 02:33:08.965 [INFO][5477] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Dec 13 02:33:08.998953 env[1256]: 2024-12-13 02:33:08.989 [INFO][5483] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" HandleID="k8s-pod-network.a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Workload="localhost-k8s-csi--node--driver--7z7tl-eth0" Dec 13 02:33:08.998953 env[1256]: 2024-12-13 02:33:08.989 [INFO][5483] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:08.998953 env[1256]: 2024-12-13 02:33:08.989 [INFO][5483] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:08.998953 env[1256]: 2024-12-13 02:33:08.994 [WARNING][5483] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" HandleID="k8s-pod-network.a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Workload="localhost-k8s-csi--node--driver--7z7tl-eth0" Dec 13 02:33:08.998953 env[1256]: 2024-12-13 02:33:08.995 [INFO][5483] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" HandleID="k8s-pod-network.a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Workload="localhost-k8s-csi--node--driver--7z7tl-eth0" Dec 13 02:33:08.998953 env[1256]: 2024-12-13 02:33:08.995 [INFO][5483] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:08.998953 env[1256]: 2024-12-13 02:33:08.997 [INFO][5477] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Dec 13 02:33:08.999931 env[1256]: time="2024-12-13T02:33:08.999112910Z" level=info msg="TearDown network for sandbox \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\" successfully" Dec 13 02:33:08.999931 env[1256]: time="2024-12-13T02:33:08.999136206Z" level=info msg="StopPodSandbox for \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\" returns successfully" Dec 13 02:33:08.999931 env[1256]: time="2024-12-13T02:33:08.999789505Z" level=info msg="RemovePodSandbox for \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\"" Dec 13 02:33:09.000626 env[1256]: time="2024-12-13T02:33:08.999811865Z" level=info msg="Forcibly stopping sandbox \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\"" Dec 13 02:33:09.074677 env[1256]: 2024-12-13 02:33:09.040 [WARNING][5502] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--7z7tl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"47c64936-f63c-409a-acf6-791447c02a65", ResourceVersion:"1013", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"61be57af801c4d5f04ec8b5e791ce8381d9989ea4cfa03010673196daffd2c8c", Pod:"csi-node-driver-7z7tl", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali315e6b2065c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:09.074677 env[1256]: 2024-12-13 02:33:09.041 [INFO][5502] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Dec 13 02:33:09.074677 env[1256]: 2024-12-13 02:33:09.041 [INFO][5502] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" iface="eth0" netns="" Dec 13 02:33:09.074677 env[1256]: 2024-12-13 02:33:09.041 [INFO][5502] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Dec 13 02:33:09.074677 env[1256]: 2024-12-13 02:33:09.041 [INFO][5502] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Dec 13 02:33:09.074677 env[1256]: 2024-12-13 02:33:09.056 [INFO][5509] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" HandleID="k8s-pod-network.a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Workload="localhost-k8s-csi--node--driver--7z7tl-eth0" Dec 13 02:33:09.074677 env[1256]: 2024-12-13 02:33:09.056 [INFO][5509] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:09.074677 env[1256]: 2024-12-13 02:33:09.056 [INFO][5509] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:09.074677 env[1256]: 2024-12-13 02:33:09.070 [WARNING][5509] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" HandleID="k8s-pod-network.a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Workload="localhost-k8s-csi--node--driver--7z7tl-eth0" Dec 13 02:33:09.074677 env[1256]: 2024-12-13 02:33:09.070 [INFO][5509] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" HandleID="k8s-pod-network.a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Workload="localhost-k8s-csi--node--driver--7z7tl-eth0" Dec 13 02:33:09.074677 env[1256]: 2024-12-13 02:33:09.071 [INFO][5509] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:09.074677 env[1256]: 2024-12-13 02:33:09.073 [INFO][5502] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108" Dec 13 02:33:09.077252 env[1256]: time="2024-12-13T02:33:09.074996636Z" level=info msg="TearDown network for sandbox \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\" successfully" Dec 13 02:33:09.078074 env[1256]: time="2024-12-13T02:33:09.078015012Z" level=info msg="RemovePodSandbox \"a2aafab11a3d3784ce24246d00a9ac77bf13561e7753346bbb646bde9cca8108\" returns successfully" Dec 13 02:33:09.078525 env[1256]: time="2024-12-13T02:33:09.078457980Z" level=info msg="StopPodSandbox for \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\"" Dec 13 02:33:09.156028 env[1256]: 2024-12-13 02:33:09.117 [WARNING][5527] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0", GenerateName:"calico-apiserver-5f6fd9c6dd-", Namespace:"calico-apiserver", SelfLink:"", UID:"b15320b7-471e-4e9e-a144-a40693bd62f6", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f6fd9c6dd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2", Pod:"calico-apiserver-5f6fd9c6dd-r886t", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3b7c6651c45", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:09.156028 env[1256]: 2024-12-13 02:33:09.117 [INFO][5527] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Dec 13 02:33:09.156028 env[1256]: 2024-12-13 02:33:09.117 [INFO][5527] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" iface="eth0" netns="" Dec 13 02:33:09.156028 env[1256]: 2024-12-13 02:33:09.117 [INFO][5527] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Dec 13 02:33:09.156028 env[1256]: 2024-12-13 02:33:09.118 [INFO][5527] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Dec 13 02:33:09.156028 env[1256]: 2024-12-13 02:33:09.148 [INFO][5534] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" HandleID="k8s-pod-network.49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0" Dec 13 02:33:09.156028 env[1256]: 2024-12-13 02:33:09.148 [INFO][5534] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:09.156028 env[1256]: 2024-12-13 02:33:09.148 [INFO][5534] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:09.156028 env[1256]: 2024-12-13 02:33:09.152 [WARNING][5534] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" HandleID="k8s-pod-network.49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0" Dec 13 02:33:09.156028 env[1256]: 2024-12-13 02:33:09.152 [INFO][5534] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" HandleID="k8s-pod-network.49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0" Dec 13 02:33:09.156028 env[1256]: 2024-12-13 02:33:09.153 [INFO][5534] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:09.156028 env[1256]: 2024-12-13 02:33:09.154 [INFO][5527] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Dec 13 02:33:09.156834 env[1256]: time="2024-12-13T02:33:09.156052465Z" level=info msg="TearDown network for sandbox \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\" successfully" Dec 13 02:33:09.156834 env[1256]: time="2024-12-13T02:33:09.156074152Z" level=info msg="StopPodSandbox for \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\" returns successfully" Dec 13 02:33:09.156834 env[1256]: time="2024-12-13T02:33:09.156409500Z" level=info msg="RemovePodSandbox for \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\"" Dec 13 02:33:09.156834 env[1256]: time="2024-12-13T02:33:09.156431449Z" level=info msg="Forcibly stopping sandbox \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\"" Dec 13 02:33:09.209030 kernel: kauditd_printk_skb: 25 callbacks suppressed Dec 13 02:33:09.209756 kernel: audit: type=1130 audit(1734057189.206:1501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.105:22-147.75.109.163:40870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:09.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.105:22-147.75.109.163:40870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:09.207974 systemd[1]: Started sshd@15-139.178.70.105:22-147.75.109.163:40870.service. Dec 13 02:33:09.238470 env[1256]: 2024-12-13 02:33:09.191 [WARNING][5554] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0", GenerateName:"calico-apiserver-5f6fd9c6dd-", Namespace:"calico-apiserver", SelfLink:"", UID:"b15320b7-471e-4e9e-a144-a40693bd62f6", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f6fd9c6dd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e26811be4a3e354324caeb81f306971fe268b5ec8f7ce99208a138ba823cb0a2", Pod:"calico-apiserver-5f6fd9c6dd-r886t", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3b7c6651c45", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:09.238470 env[1256]: 2024-12-13 02:33:09.191 [INFO][5554] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Dec 13 02:33:09.238470 env[1256]: 2024-12-13 02:33:09.191 [INFO][5554] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" iface="eth0" netns="" Dec 13 02:33:09.238470 env[1256]: 2024-12-13 02:33:09.191 [INFO][5554] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Dec 13 02:33:09.238470 env[1256]: 2024-12-13 02:33:09.191 [INFO][5554] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Dec 13 02:33:09.238470 env[1256]: 2024-12-13 02:33:09.217 [INFO][5560] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" HandleID="k8s-pod-network.49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0" Dec 13 02:33:09.238470 env[1256]: 2024-12-13 02:33:09.217 [INFO][5560] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:09.238470 env[1256]: 2024-12-13 02:33:09.217 [INFO][5560] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:09.238470 env[1256]: 2024-12-13 02:33:09.225 [WARNING][5560] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" HandleID="k8s-pod-network.49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0" Dec 13 02:33:09.238470 env[1256]: 2024-12-13 02:33:09.225 [INFO][5560] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" HandleID="k8s-pod-network.49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--r886t-eth0" Dec 13 02:33:09.238470 env[1256]: 2024-12-13 02:33:09.233 [INFO][5560] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:09.238470 env[1256]: 2024-12-13 02:33:09.235 [INFO][5554] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d" Dec 13 02:33:09.241540 env[1256]: time="2024-12-13T02:33:09.238504159Z" level=info msg="TearDown network for sandbox \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\" successfully" Dec 13 02:33:09.244909 env[1256]: time="2024-12-13T02:33:09.244872873Z" level=info msg="RemovePodSandbox \"49e38490b691ad90998baa39983ed68c064481181e71681b74694895e82c1b0d\" returns successfully" Dec 13 02:33:09.245650 env[1256]: time="2024-12-13T02:33:09.245629906Z" level=info msg="StopPodSandbox for \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\"" Dec 13 02:33:09.328210 env[1256]: 2024-12-13 02:33:09.284 [WARNING][5580] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0", GenerateName:"calico-apiserver-5f6fd9c6dd-", Namespace:"calico-apiserver", SelfLink:"", UID:"0b579c6e-3d61-42ac-9ad3-a083377b25bd", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f6fd9c6dd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648", Pod:"calico-apiserver-5f6fd9c6dd-9s8w5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8be2dad0f35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:09.328210 env[1256]: 2024-12-13 02:33:09.284 [INFO][5580] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Dec 13 02:33:09.328210 env[1256]: 2024-12-13 02:33:09.284 [INFO][5580] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" iface="eth0" netns="" Dec 13 02:33:09.328210 env[1256]: 2024-12-13 02:33:09.284 [INFO][5580] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Dec 13 02:33:09.328210 env[1256]: 2024-12-13 02:33:09.284 [INFO][5580] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Dec 13 02:33:09.328210 env[1256]: 2024-12-13 02:33:09.305 [INFO][5586] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" HandleID="k8s-pod-network.0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0" Dec 13 02:33:09.328210 env[1256]: 2024-12-13 02:33:09.305 [INFO][5586] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:09.328210 env[1256]: 2024-12-13 02:33:09.305 [INFO][5586] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:09.328210 env[1256]: 2024-12-13 02:33:09.310 [WARNING][5586] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" HandleID="k8s-pod-network.0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0" Dec 13 02:33:09.328210 env[1256]: 2024-12-13 02:33:09.310 [INFO][5586] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" HandleID="k8s-pod-network.0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0" Dec 13 02:33:09.328210 env[1256]: 2024-12-13 02:33:09.312 [INFO][5586] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:09.328210 env[1256]: 2024-12-13 02:33:09.325 [INFO][5580] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Dec 13 02:33:09.328900 env[1256]: time="2024-12-13T02:33:09.328857362Z" level=info msg="TearDown network for sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\" successfully" Dec 13 02:33:09.329360 env[1256]: time="2024-12-13T02:33:09.328997523Z" level=info msg="StopPodSandbox for \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\" returns successfully" Dec 13 02:33:09.334428 env[1256]: time="2024-12-13T02:33:09.334397622Z" level=info msg="RemovePodSandbox for \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\"" Dec 13 02:33:09.339154 env[1256]: time="2024-12-13T02:33:09.334629118Z" level=info msg="Forcibly stopping sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\"" Dec 13 02:33:09.369000 audit[5565]: USER_ACCT pid=5565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:09.392792 kernel: audit: type=1101 audit(1734057189.369:1502): pid=5565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:09.392874 kernel: audit: type=1103 audit(1734057189.373:1503): pid=5565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:09.392900 kernel: audit: type=1006 audit(1734057189.373:1504): pid=5565 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 02:33:09.392919 kernel: audit: type=1300 audit(1734057189.373:1504): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc12076920 a2=3 a3=0 items=0 ppid=1 pid=5565 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:09.392936 kernel: audit: type=1327 audit(1734057189.373:1504): proctitle=737368643A20636F7265205B707269765D Dec 13 02:33:09.392957 kernel: audit: type=1105 audit(1734057189.385:1505): pid=5565 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:09.373000 audit[5565]: CRED_ACQ pid=5565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:09.396457 kernel: audit: type=1103 audit(1734057189.387:1506): pid=5612 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:09.373000 audit[5565]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc12076920 a2=3 a3=0 items=0 ppid=1 pid=5565 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:09.373000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:33:09.385000 audit[5565]: USER_START pid=5565 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:09.387000 audit[5612]: CRED_ACQ pid=5612 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:09.405099 sshd[5565]: Accepted publickey for core from 147.75.109.163 port 40870 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:33:09.376659 sshd[5565]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:33:09.381386 systemd-logind[1241]: New session 18 of user core. Dec 13 02:33:09.382572 systemd[1]: Started session-18.scope. Dec 13 02:33:09.420376 env[1256]: 2024-12-13 02:33:09.386 [WARNING][5606] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0", GenerateName:"calico-apiserver-5f6fd9c6dd-", Namespace:"calico-apiserver", SelfLink:"", UID:"0b579c6e-3d61-42ac-9ad3-a083377b25bd", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f6fd9c6dd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"be4fc63372d741dec55556d1b53fd63da3d29ec2954a4215b1f7c474c454b648", Pod:"calico-apiserver-5f6fd9c6dd-9s8w5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8be2dad0f35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:09.420376 env[1256]: 2024-12-13 02:33:09.387 [INFO][5606] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Dec 13 02:33:09.420376 env[1256]: 2024-12-13 02:33:09.387 [INFO][5606] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" iface="eth0" netns="" Dec 13 02:33:09.420376 env[1256]: 2024-12-13 02:33:09.387 [INFO][5606] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Dec 13 02:33:09.420376 env[1256]: 2024-12-13 02:33:09.387 [INFO][5606] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Dec 13 02:33:09.420376 env[1256]: 2024-12-13 02:33:09.409 [INFO][5613] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" HandleID="k8s-pod-network.0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0" Dec 13 02:33:09.420376 env[1256]: 2024-12-13 02:33:09.410 [INFO][5613] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:09.420376 env[1256]: 2024-12-13 02:33:09.410 [INFO][5613] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:09.420376 env[1256]: 2024-12-13 02:33:09.415 [WARNING][5613] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" HandleID="k8s-pod-network.0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0" Dec 13 02:33:09.420376 env[1256]: 2024-12-13 02:33:09.415 [INFO][5613] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" HandleID="k8s-pod-network.0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Workload="localhost-k8s-calico--apiserver--5f6fd9c6dd--9s8w5-eth0" Dec 13 02:33:09.420376 env[1256]: 2024-12-13 02:33:09.416 [INFO][5613] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:09.420376 env[1256]: 2024-12-13 02:33:09.417 [INFO][5606] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994" Dec 13 02:33:09.422305 env[1256]: time="2024-12-13T02:33:09.420397247Z" level=info msg="TearDown network for sandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\" successfully" Dec 13 02:33:09.422305 env[1256]: time="2024-12-13T02:33:09.421888577Z" level=info msg="RemovePodSandbox \"0711bb463451d378bac46c81210f5e7576be2c91a7ed6ec52aaacc18ab982994\" returns successfully" Dec 13 02:33:09.425058 env[1256]: time="2024-12-13T02:33:09.425032396Z" level=info msg="StopPodSandbox for \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\"" Dec 13 02:33:09.425313 env[1256]: time="2024-12-13T02:33:09.425263282Z" level=info msg="TearDown network for sandbox \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\" successfully" Dec 13 02:33:09.425392 env[1256]: time="2024-12-13T02:33:09.425377424Z" level=info msg="StopPodSandbox for \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\" returns successfully" Dec 13 02:33:09.425673 env[1256]: time="2024-12-13T02:33:09.425660443Z" level=info msg="RemovePodSandbox for \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\"" Dec 13 02:33:09.425762 env[1256]: time="2024-12-13T02:33:09.425735387Z" level=info msg="Forcibly stopping sandbox \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\"" Dec 13 02:33:09.425864 env[1256]: time="2024-12-13T02:33:09.425847744Z" level=info msg="TearDown network for sandbox \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\" successfully" Dec 13 02:33:09.431957 env[1256]: time="2024-12-13T02:33:09.431925684Z" level=info msg="RemovePodSandbox \"77bd5b5ade4f37c44642108042c8695ebea76836f96ed335ada2bc66a17897c1\" returns successfully" Dec 13 02:33:09.432437 env[1256]: time="2024-12-13T02:33:09.432397913Z" level=info msg="StopPodSandbox for \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\"" Dec 13 02:33:09.598832 env[1256]: 2024-12-13 02:33:09.550 [WARNING][5632] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--tq85l-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"317605d2-93ce-4fec-922f-d14e17bc8373", ResourceVersion:"899", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23", Pod:"coredns-6f6b679f8f-tq85l", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0a34d012c79", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:09.598832 env[1256]: 2024-12-13 02:33:09.550 [INFO][5632] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Dec 13 02:33:09.598832 env[1256]: 2024-12-13 02:33:09.550 [INFO][5632] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" iface="eth0" netns="" Dec 13 02:33:09.598832 env[1256]: 2024-12-13 02:33:09.551 [INFO][5632] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Dec 13 02:33:09.598832 env[1256]: 2024-12-13 02:33:09.551 [INFO][5632] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Dec 13 02:33:09.598832 env[1256]: 2024-12-13 02:33:09.566 [INFO][5640] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" HandleID="k8s-pod-network.399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Workload="localhost-k8s-coredns--6f6b679f8f--tq85l-eth0" Dec 13 02:33:09.598832 env[1256]: 2024-12-13 02:33:09.566 [INFO][5640] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:09.598832 env[1256]: 2024-12-13 02:33:09.566 [INFO][5640] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:09.598832 env[1256]: 2024-12-13 02:33:09.595 [WARNING][5640] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" HandleID="k8s-pod-network.399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Workload="localhost-k8s-coredns--6f6b679f8f--tq85l-eth0" Dec 13 02:33:09.598832 env[1256]: 2024-12-13 02:33:09.595 [INFO][5640] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" HandleID="k8s-pod-network.399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Workload="localhost-k8s-coredns--6f6b679f8f--tq85l-eth0" Dec 13 02:33:09.598832 env[1256]: 2024-12-13 02:33:09.596 [INFO][5640] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:09.598832 env[1256]: 2024-12-13 02:33:09.597 [INFO][5632] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Dec 13 02:33:09.598832 env[1256]: time="2024-12-13T02:33:09.598796842Z" level=info msg="TearDown network for sandbox \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\" successfully" Dec 13 02:33:09.604150 env[1256]: time="2024-12-13T02:33:09.598817563Z" level=info msg="StopPodSandbox for \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\" returns successfully" Dec 13 02:33:09.604150 env[1256]: time="2024-12-13T02:33:09.600946588Z" level=info msg="RemovePodSandbox for \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\"" Dec 13 02:33:09.604150 env[1256]: time="2024-12-13T02:33:09.600964719Z" level=info msg="Forcibly stopping sandbox \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\"" Dec 13 02:33:09.721219 env[1256]: 2024-12-13 02:33:09.679 [WARNING][5660] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--tq85l-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"317605d2-93ce-4fec-922f-d14e17bc8373", ResourceVersion:"899", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"dacd3a320c3858c96c3bdf9e886ec71e5bf4b6e6c0fd45ad59b4c642e51b1c23", Pod:"coredns-6f6b679f8f-tq85l", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0a34d012c79", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:09.721219 env[1256]: 2024-12-13 02:33:09.680 [INFO][5660] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Dec 13 02:33:09.721219 env[1256]: 2024-12-13 02:33:09.680 [INFO][5660] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" iface="eth0" netns="" Dec 13 02:33:09.721219 env[1256]: 2024-12-13 02:33:09.680 [INFO][5660] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Dec 13 02:33:09.721219 env[1256]: 2024-12-13 02:33:09.680 [INFO][5660] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Dec 13 02:33:09.721219 env[1256]: 2024-12-13 02:33:09.705 [INFO][5666] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" HandleID="k8s-pod-network.399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Workload="localhost-k8s-coredns--6f6b679f8f--tq85l-eth0" Dec 13 02:33:09.721219 env[1256]: 2024-12-13 02:33:09.705 [INFO][5666] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:09.721219 env[1256]: 2024-12-13 02:33:09.705 [INFO][5666] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:09.721219 env[1256]: 2024-12-13 02:33:09.710 [WARNING][5666] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" HandleID="k8s-pod-network.399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Workload="localhost-k8s-coredns--6f6b679f8f--tq85l-eth0" Dec 13 02:33:09.721219 env[1256]: 2024-12-13 02:33:09.710 [INFO][5666] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" HandleID="k8s-pod-network.399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Workload="localhost-k8s-coredns--6f6b679f8f--tq85l-eth0" Dec 13 02:33:09.721219 env[1256]: 2024-12-13 02:33:09.715 [INFO][5666] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:09.721219 env[1256]: 2024-12-13 02:33:09.717 [INFO][5660] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8" Dec 13 02:33:09.721747 env[1256]: time="2024-12-13T02:33:09.721720096Z" level=info msg="TearDown network for sandbox \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\" successfully" Dec 13 02:33:09.723410 env[1256]: time="2024-12-13T02:33:09.723390405Z" level=info msg="RemovePodSandbox \"399508aad2f8b1516a99c082852f046469471cd761fdf810e3cd576cfb7af4d8\" returns successfully" Dec 13 02:33:09.723790 env[1256]: time="2024-12-13T02:33:09.723776615Z" level=info msg="StopPodSandbox for \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\"" Dec 13 02:33:09.816245 env[1256]: 2024-12-13 02:33:09.772 [WARNING][5688] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7", ResourceVersion:"1046", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff", Pod:"coredns-6f6b679f8f-xkmf7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali46b7a9efd4d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:09.816245 env[1256]: 2024-12-13 02:33:09.772 [INFO][5688] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Dec 13 02:33:09.816245 env[1256]: 2024-12-13 02:33:09.772 [INFO][5688] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" iface="eth0" netns="" Dec 13 02:33:09.816245 env[1256]: 2024-12-13 02:33:09.772 [INFO][5688] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Dec 13 02:33:09.816245 env[1256]: 2024-12-13 02:33:09.772 [INFO][5688] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Dec 13 02:33:09.816245 env[1256]: 2024-12-13 02:33:09.806 [INFO][5694] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" HandleID="k8s-pod-network.8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Workload="localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0" Dec 13 02:33:09.816245 env[1256]: 2024-12-13 02:33:09.806 [INFO][5694] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:09.816245 env[1256]: 2024-12-13 02:33:09.806 [INFO][5694] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:09.816245 env[1256]: 2024-12-13 02:33:09.810 [WARNING][5694] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" HandleID="k8s-pod-network.8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Workload="localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0" Dec 13 02:33:09.816245 env[1256]: 2024-12-13 02:33:09.810 [INFO][5694] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" HandleID="k8s-pod-network.8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Workload="localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0" Dec 13 02:33:09.816245 env[1256]: 2024-12-13 02:33:09.811 [INFO][5694] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:09.816245 env[1256]: 2024-12-13 02:33:09.813 [INFO][5688] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Dec 13 02:33:09.816690 env[1256]: time="2024-12-13T02:33:09.816665424Z" level=info msg="TearDown network for sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\" successfully" Dec 13 02:33:09.816756 env[1256]: time="2024-12-13T02:33:09.816743864Z" level=info msg="StopPodSandbox for \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\" returns successfully" Dec 13 02:33:09.817115 env[1256]: time="2024-12-13T02:33:09.817102416Z" level=info msg="RemovePodSandbox for \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\"" Dec 13 02:33:09.817260 env[1256]: time="2024-12-13T02:33:09.817237270Z" level=info msg="Forcibly stopping sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\"" Dec 13 02:33:09.899072 env[1256]: 2024-12-13 02:33:09.860 [WARNING][5713] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"b9e81d15-a4e1-40f7-97c8-5de9c4bc4ea7", ResourceVersion:"1046", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 31, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a32196456aa247fb89f61b8f889e857cd460678471b3fdaa22af3e0740e449ff", Pod:"coredns-6f6b679f8f-xkmf7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali46b7a9efd4d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:33:09.899072 env[1256]: 2024-12-13 02:33:09.860 [INFO][5713] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Dec 13 02:33:09.899072 env[1256]: 2024-12-13 02:33:09.860 [INFO][5713] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" iface="eth0" netns="" Dec 13 02:33:09.899072 env[1256]: 2024-12-13 02:33:09.860 [INFO][5713] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Dec 13 02:33:09.899072 env[1256]: 2024-12-13 02:33:09.860 [INFO][5713] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Dec 13 02:33:09.899072 env[1256]: 2024-12-13 02:33:09.887 [INFO][5719] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" HandleID="k8s-pod-network.8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Workload="localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0" Dec 13 02:33:09.899072 env[1256]: 2024-12-13 02:33:09.887 [INFO][5719] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:33:09.899072 env[1256]: 2024-12-13 02:33:09.887 [INFO][5719] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:33:09.899072 env[1256]: 2024-12-13 02:33:09.892 [WARNING][5719] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" HandleID="k8s-pod-network.8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Workload="localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0" Dec 13 02:33:09.899072 env[1256]: 2024-12-13 02:33:09.892 [INFO][5719] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" HandleID="k8s-pod-network.8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Workload="localhost-k8s-coredns--6f6b679f8f--xkmf7-eth0" Dec 13 02:33:09.899072 env[1256]: 2024-12-13 02:33:09.893 [INFO][5719] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:33:09.899072 env[1256]: 2024-12-13 02:33:09.897 [INFO][5713] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8" Dec 13 02:33:09.901819 env[1256]: time="2024-12-13T02:33:09.900399064Z" level=info msg="TearDown network for sandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\" successfully" Dec 13 02:33:09.903651 env[1256]: time="2024-12-13T02:33:09.903633293Z" level=info msg="RemovePodSandbox \"8100e8dc8fab1d8ca4900883a4a76702a33f51eb31336b841d42a27c5656aab8\" returns successfully" Dec 13 02:33:10.079913 sshd[5565]: pam_unix(sshd:session): session closed for user core Dec 13 02:33:10.080000 audit[5565]: USER_END pid=5565 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:10.083204 systemd[1]: Started sshd@16-139.178.70.105:22-147.75.109.163:40886.service. Dec 13 02:33:10.086044 kernel: audit: type=1106 audit(1734057190.080:1507): pid=5565 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:10.086835 kernel: audit: type=1104 audit(1734057190.084:1508): pid=5565 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:10.084000 audit[5565]: CRED_DISP pid=5565 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:10.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.105:22-147.75.109.163:40886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:10.091143 systemd-logind[1241]: Session 18 logged out. Waiting for processes to exit. Dec 13 02:33:10.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.105:22-147.75.109.163:40870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:10.091347 systemd[1]: sshd@15-139.178.70.105:22-147.75.109.163:40870.service: Deactivated successfully. Dec 13 02:33:10.091961 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 02:33:10.093773 systemd-logind[1241]: Removed session 18. Dec 13 02:33:10.128000 audit[5726]: USER_ACCT pid=5726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:10.130072 sshd[5726]: Accepted publickey for core from 147.75.109.163 port 40886 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:33:10.130000 audit[5726]: CRED_ACQ pid=5726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:10.130000 audit[5726]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5f04fdc0 a2=3 a3=0 items=0 ppid=1 pid=5726 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:10.130000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:33:10.131507 sshd[5726]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:33:10.134553 systemd-logind[1241]: New session 19 of user core. Dec 13 02:33:10.135402 systemd[1]: Started session-19.scope. Dec 13 02:33:10.137000 audit[5726]: USER_START pid=5726 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:10.138000 audit[5729]: CRED_ACQ pid=5729 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:11.019904 sshd[5726]: pam_unix(sshd:session): session closed for user core Dec 13 02:33:11.020337 systemd[1]: Started sshd@17-139.178.70.105:22-147.75.109.163:40896.service. Dec 13 02:33:11.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.105:22-147.75.109.163:40896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:11.024000 audit[5726]: USER_END pid=5726 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:11.025000 audit[5726]: CRED_DISP pid=5726 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:11.027502 systemd[1]: sshd@16-139.178.70.105:22-147.75.109.163:40886.service: Deactivated successfully. Dec 13 02:33:11.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.105:22-147.75.109.163:40886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:11.028069 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 02:33:11.028542 systemd-logind[1241]: Session 19 logged out. Waiting for processes to exit. Dec 13 02:33:11.029980 systemd-logind[1241]: Removed session 19. Dec 13 02:33:11.723819 sshd[5752]: Accepted publickey for core from 147.75.109.163 port 40896 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:33:11.721000 audit[5752]: USER_ACCT pid=5752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:11.723000 audit[5752]: CRED_ACQ pid=5752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:11.723000 audit[5752]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc29f6ad90 a2=3 a3=0 items=0 ppid=1 pid=5752 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:11.723000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:33:11.743055 sshd[5752]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:33:11.759854 systemd-logind[1241]: New session 20 of user core. Dec 13 02:33:11.763000 audit[5752]: USER_START pid=5752 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:11.764000 audit[5758]: CRED_ACQ pid=5758 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:11.760423 systemd[1]: Started session-20.scope. Dec 13 02:33:11.952000 audit[1967]: AVC avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:33:11.952000 audit[1967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c003530b20 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:33:11.952000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:33:11.982000 audit[1967]: AVC avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:33:11.982000 audit[1967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=f a1=c0033a4b60 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:33:11.982000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:33:12.071000 audit[1967]: AVC avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:33:12.071000 audit[1967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0033a4b80 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:33:12.071000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:33:12.091000 audit[1967]: AVC avc: denied { watch } for pid=1967 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:33:12.091000 audit[1967]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0033a4ba0 a2=fc6 a3=0 items=0 ppid=1852 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c888 key=(null) Dec 13 02:33:12.091000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:33:15.045198 sshd[5752]: pam_unix(sshd:session): session closed for user core Dec 13 02:33:15.110228 kernel: kauditd_printk_skb: 32 callbacks suppressed Dec 13 02:33:15.125675 kernel: audit: type=1106 audit(1734057195.074:1529): pid=5752 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:15.134272 kernel: audit: type=1130 audit(1734057195.074:1530): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.105:22-147.75.109.163:40910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:15.136962 kernel: audit: type=1104 audit(1734057195.079:1531): pid=5752 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:15.137006 kernel: audit: type=1131 audit(1734057195.097:1532): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.105:22-147.75.109.163:40896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:15.137025 kernel: audit: type=1325 audit(1734057195.114:1533): table=filter:120 family=2 entries=20 op=nft_register_rule pid=5785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:15.138235 kernel: audit: type=1300 audit(1734057195.114:1533): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffed9e9b050 a2=0 a3=7ffed9e9b03c items=0 ppid=2250 pid=5785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:15.141762 kernel: audit: type=1327 audit(1734057195.114:1533): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:33:15.144014 kernel: audit: type=1325 audit(1734057195.117:1534): table=nat:121 family=2 entries=22 op=nft_register_rule pid=5785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:15.144041 kernel: audit: type=1300 audit(1734057195.117:1534): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffed9e9b050 a2=0 a3=0 items=0 ppid=2250 pid=5785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:15.146625 kernel: audit: type=1327 audit(1734057195.117:1534): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:33:15.074000 audit[5752]: USER_END pid=5752 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:15.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.105:22-147.75.109.163:40910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:15.079000 audit[5752]: CRED_DISP pid=5752 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:15.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.105:22-147.75.109.163:40896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:15.114000 audit[5785]: NETFILTER_CFG table=filter:120 family=2 entries=20 op=nft_register_rule pid=5785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:15.114000 audit[5785]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffed9e9b050 a2=0 a3=7ffed9e9b03c items=0 ppid=2250 pid=5785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:15.114000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:33:15.117000 audit[5785]: NETFILTER_CFG table=nat:121 family=2 entries=22 op=nft_register_rule pid=5785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:15.117000 audit[5785]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffed9e9b050 a2=0 a3=0 items=0 ppid=2250 pid=5785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:15.117000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:33:15.137000 audit[5787]: NETFILTER_CFG table=filter:122 family=2 entries=32 op=nft_register_rule pid=5787 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:15.137000 audit[5787]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe9ad5b930 a2=0 a3=7ffe9ad5b91c items=0 ppid=2250 pid=5787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:15.137000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:33:15.143000 audit[5787]: NETFILTER_CFG table=nat:123 family=2 entries=22 op=nft_register_rule pid=5787 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:15.143000 audit[5787]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe9ad5b930 a2=0 a3=0 items=0 ppid=2250 pid=5787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:15.143000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:33:15.069520 systemd[1]: Started sshd@18-139.178.70.105:22-147.75.109.163:40910.service. Dec 13 02:33:15.097683 systemd[1]: sshd@17-139.178.70.105:22-147.75.109.163:40896.service: Deactivated successfully. Dec 13 02:33:15.101817 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 02:33:15.102465 systemd-logind[1241]: Session 20 logged out. Waiting for processes to exit. Dec 13 02:33:15.103152 systemd-logind[1241]: Removed session 20. Dec 13 02:33:15.205000 audit[5783]: USER_ACCT pid=5783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:15.205397 sshd[5783]: Accepted publickey for core from 147.75.109.163 port 40910 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:33:15.205000 audit[5783]: CRED_ACQ pid=5783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:15.205000 audit[5783]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc37722640 a2=3 a3=0 items=0 ppid=1 pid=5783 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:15.205000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:33:15.206315 sshd[5783]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:33:15.213579 systemd[1]: Started session-21.scope. Dec 13 02:33:15.214474 systemd-logind[1241]: New session 21 of user core. Dec 13 02:33:15.217000 audit[5783]: USER_START pid=5783 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:15.218000 audit[5789]: CRED_ACQ pid=5789 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:16.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.105:22-147.75.109.163:46056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:16.807000 audit[5783]: USER_END pid=5783 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:16.808000 audit[5783]: CRED_DISP pid=5783 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:16.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.105:22-147.75.109.163:40910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:16.795451 systemd[1]: Started sshd@19-139.178.70.105:22-147.75.109.163:46056.service. Dec 13 02:33:16.801156 sshd[5783]: pam_unix(sshd:session): session closed for user core Dec 13 02:33:16.813592 systemd[1]: sshd@18-139.178.70.105:22-147.75.109.163:40910.service: Deactivated successfully. Dec 13 02:33:16.814213 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 02:33:16.815242 systemd-logind[1241]: Session 21 logged out. Waiting for processes to exit. Dec 13 02:33:16.817042 systemd-logind[1241]: Removed session 21. Dec 13 02:33:17.059000 audit[5796]: USER_ACCT pid=5796 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:17.060000 audit[5796]: CRED_ACQ pid=5796 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:17.060000 audit[5796]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff31fe7530 a2=3 a3=0 items=0 ppid=1 pid=5796 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:17.060000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:33:17.064201 sshd[5796]: Accepted publickey for core from 147.75.109.163 port 46056 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:33:17.063422 sshd[5796]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:33:17.067903 systemd[1]: Started session-22.scope. Dec 13 02:33:17.068414 systemd-logind[1241]: New session 22 of user core. Dec 13 02:33:17.072000 audit[5796]: USER_START pid=5796 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:17.073000 audit[5799]: CRED_ACQ pid=5799 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:17.727020 sshd[5796]: pam_unix(sshd:session): session closed for user core Dec 13 02:33:17.729000 audit[5796]: USER_END pid=5796 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:17.729000 audit[5796]: CRED_DISP pid=5796 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:17.731298 systemd-logind[1241]: Session 22 logged out. Waiting for processes to exit. Dec 13 02:33:17.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.105:22-147.75.109.163:46056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:17.732256 systemd[1]: sshd@19-139.178.70.105:22-147.75.109.163:46056.service: Deactivated successfully. Dec 13 02:33:17.732756 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 02:33:17.733684 systemd-logind[1241]: Removed session 22. Dec 13 02:33:21.083034 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 02:33:21.092773 kernel: audit: type=1325 audit(1734057201.074:1554): table=filter:124 family=2 entries=20 op=nft_register_rule pid=5810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:21.093634 kernel: audit: type=1300 audit(1734057201.074:1554): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd309f6960 a2=0 a3=7ffd309f694c items=0 ppid=2250 pid=5810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:21.093665 kernel: audit: type=1327 audit(1734057201.074:1554): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:33:21.094668 kernel: audit: type=1325 audit(1734057201.084:1555): table=nat:125 family=2 entries=106 op=nft_register_chain pid=5810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:21.094695 kernel: audit: type=1300 audit(1734057201.084:1555): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd309f6960 a2=0 a3=7ffd309f694c items=0 ppid=2250 pid=5810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:21.094715 kernel: audit: type=1327 audit(1734057201.084:1555): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:33:21.074000 audit[5810]: NETFILTER_CFG table=filter:124 family=2 entries=20 op=nft_register_rule pid=5810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:21.074000 audit[5810]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd309f6960 a2=0 a3=7ffd309f694c items=0 ppid=2250 pid=5810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:21.074000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:33:21.084000 audit[5810]: NETFILTER_CFG table=nat:125 family=2 entries=106 op=nft_register_chain pid=5810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:33:21.084000 audit[5810]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd309f6960 a2=0 a3=7ffd309f694c items=0 ppid=2250 pid=5810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:21.084000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:33:22.754274 systemd[1]: Started sshd@20-139.178.70.105:22-147.75.109.163:46060.service. Dec 13 02:33:22.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.105:22-147.75.109.163:46060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:22.764391 kernel: audit: type=1130 audit(1734057202.757:1556): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.105:22-147.75.109.163:46060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:23.145000 audit[5835]: USER_ACCT pid=5835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:23.150937 kernel: audit: type=1101 audit(1734057203.145:1557): pid=5835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:23.150987 kernel: audit: type=1103 audit(1734057203.149:1558): pid=5835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:23.149000 audit[5835]: CRED_ACQ pid=5835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:23.151336 sshd[5835]: Accepted publickey for core from 147.75.109.163 port 46060 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:33:23.154820 kernel: audit: type=1006 audit(1734057203.149:1559): pid=5835 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 02:33:23.149000 audit[5835]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc84eb9660 a2=3 a3=0 items=0 ppid=1 pid=5835 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:23.149000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:33:23.165086 sshd[5835]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:33:23.216605 systemd[1]: Started session-23.scope. Dec 13 02:33:23.220000 audit[5835]: USER_START pid=5835 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:23.221000 audit[5837]: CRED_ACQ pid=5837 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:23.216900 systemd-logind[1241]: New session 23 of user core. Dec 13 02:33:25.237782 sshd[5835]: pam_unix(sshd:session): session closed for user core Dec 13 02:33:25.238000 audit[5835]: USER_END pid=5835 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:25.238000 audit[5835]: CRED_DISP pid=5835 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:25.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.105:22-147.75.109.163:46060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:25.240391 systemd[1]: sshd@20-139.178.70.105:22-147.75.109.163:46060.service: Deactivated successfully. Dec 13 02:33:25.241063 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 02:33:25.241763 systemd-logind[1241]: Session 23 logged out. Waiting for processes to exit. Dec 13 02:33:25.242702 systemd-logind[1241]: Removed session 23. Dec 13 02:33:30.326905 systemd[1]: Started sshd@21-139.178.70.105:22-147.75.109.163:54790.service. Dec 13 02:33:30.332844 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 02:33:30.332892 kernel: audit: type=1130 audit(1734057210.326:1565): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.105:22-147.75.109.163:54790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:30.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.105:22-147.75.109.163:54790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:30.416000 audit[5847]: USER_ACCT pid=5847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:30.421549 kernel: audit: type=1101 audit(1734057210.416:1566): pid=5847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:30.421940 sshd[5847]: Accepted publickey for core from 147.75.109.163 port 54790 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:33:30.423000 audit[5847]: CRED_ACQ pid=5847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:30.428831 kernel: audit: type=1103 audit(1734057210.423:1567): pid=5847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:30.428878 kernel: audit: type=1006 audit(1734057210.426:1568): pid=5847 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 02:33:30.429124 kernel: audit: type=1300 audit(1734057210.426:1568): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd11a89c10 a2=3 a3=0 items=0 ppid=1 pid=5847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:30.426000 audit[5847]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd11a89c10 a2=3 a3=0 items=0 ppid=1 pid=5847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:30.426000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:33:30.433846 kernel: audit: type=1327 audit(1734057210.426:1568): proctitle=737368643A20636F7265205B707269765D Dec 13 02:33:30.434045 sshd[5847]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:33:30.440956 systemd-logind[1241]: New session 24 of user core. Dec 13 02:33:30.441582 systemd[1]: Started session-24.scope. Dec 13 02:33:30.444000 audit[5847]: USER_START pid=5847 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:30.446000 audit[5849]: CRED_ACQ pid=5849 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:30.451963 kernel: audit: type=1105 audit(1734057210.444:1569): pid=5847 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:30.452288 kernel: audit: type=1103 audit(1734057210.446:1570): pid=5849 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:30.732569 sshd[5847]: pam_unix(sshd:session): session closed for user core Dec 13 02:33:30.735000 audit[5847]: USER_END pid=5847 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:30.737409 systemd[1]: sshd@21-139.178.70.105:22-147.75.109.163:54790.service: Deactivated successfully. Dec 13 02:33:30.737915 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 02:33:30.739906 systemd-logind[1241]: Session 24 logged out. Waiting for processes to exit. Dec 13 02:33:30.740183 kernel: audit: type=1106 audit(1734057210.735:1571): pid=5847 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:30.740797 kernel: audit: type=1104 audit(1734057210.735:1572): pid=5847 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:30.735000 audit[5847]: CRED_DISP pid=5847 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:30.743706 systemd-logind[1241]: Removed session 24. Dec 13 02:33:30.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.105:22-147.75.109.163:54790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:35.199000 audit[4860]: AVC avc: denied { watch } for pid=4860 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_31_33.3694933065/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c394,c1017 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c394,c1017 tclass=file permissive=0 Dec 13 02:33:35.199000 audit[4860]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a1ba40 a2=fc6 a3=0 items=0 ppid=4741 pid=4860 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c394,c1017 key=(null) Dec 13 02:33:35.199000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:33:35.739137 systemd[1]: Started sshd@22-139.178.70.105:22-147.75.109.163:54794.service. Dec 13 02:33:35.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.105:22-147.75.109.163:54794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:35.745134 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 02:33:35.745244 kernel: audit: type=1130 audit(1734057215.739:1575): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.105:22-147.75.109.163:54794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:35.846000 audit[5860]: USER_ACCT pid=5860 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:35.850713 kernel: audit: type=1101 audit(1734057215.846:1576): pid=5860 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:35.850758 sshd[5860]: Accepted publickey for core from 147.75.109.163 port 54794 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:33:35.851000 audit[5860]: CRED_ACQ pid=5860 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:35.856489 kernel: audit: type=1103 audit(1734057215.851:1577): pid=5860 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:35.856524 kernel: audit: type=1006 audit(1734057215.851:1578): pid=5860 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 02:33:35.856542 kernel: audit: type=1300 audit(1734057215.851:1578): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff11fcff10 a2=3 a3=0 items=0 ppid=1 pid=5860 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:35.851000 audit[5860]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff11fcff10 a2=3 a3=0 items=0 ppid=1 pid=5860 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:33:35.860883 kernel: audit: type=1327 audit(1734057215.851:1578): proctitle=737368643A20636F7265205B707269765D Dec 13 02:33:35.851000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:33:35.861028 sshd[5860]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:33:35.868551 systemd-logind[1241]: New session 25 of user core. Dec 13 02:33:35.869126 systemd[1]: Started session-25.scope. Dec 13 02:33:35.872000 audit[5860]: USER_START pid=5860 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:35.876768 kernel: audit: type=1105 audit(1734057215.872:1579): pid=5860 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:35.876800 kernel: audit: type=1103 audit(1734057215.876:1580): pid=5862 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:35.876000 audit[5862]: CRED_ACQ pid=5862 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:36.196333 sshd[5860]: pam_unix(sshd:session): session closed for user core Dec 13 02:33:36.197000 audit[5860]: USER_END pid=5860 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:36.197000 audit[5860]: CRED_DISP pid=5860 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:36.204151 kernel: audit: type=1106 audit(1734057216.197:1581): pid=5860 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:36.204898 kernel: audit: type=1104 audit(1734057216.197:1582): pid=5860 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:33:36.204357 systemd[1]: sshd@22-139.178.70.105:22-147.75.109.163:54794.service: Deactivated successfully. Dec 13 02:33:36.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.105:22-147.75.109.163:54794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:33:36.204898 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 02:33:36.205437 systemd-logind[1241]: Session 25 logged out. Waiting for processes to exit. Dec 13 02:33:36.206005 systemd-logind[1241]: Removed session 25.