Dec 13 13:57:02.729148 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Dec 13 13:57:02.729168 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Dec 13 12:58:58 -00 2024 Dec 13 13:57:02.729176 kernel: efi: EFI v2.70 by EDK II Dec 13 13:57:02.729182 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Dec 13 13:57:02.729187 kernel: random: crng init done Dec 13 13:57:02.729192 kernel: ACPI: Early table checksum verification disabled Dec 13 13:57:02.729198 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Dec 13 13:57:02.729205 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Dec 13 13:57:02.729211 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:57:02.729216 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:57:02.729222 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:57:02.729227 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:57:02.729232 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:57:02.729238 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:57:02.729246 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:57:02.729251 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:57:02.729258 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:57:02.729263 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Dec 13 13:57:02.729269 kernel: NUMA: Failed to initialise from firmware Dec 13 13:57:02.729275 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Dec 13 13:57:02.729281 kernel: NUMA: NODE_DATA [mem 0xdcb09900-0xdcb0efff] Dec 13 13:57:02.729287 kernel: Zone ranges: Dec 13 13:57:02.729293 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Dec 13 13:57:02.729299 kernel: DMA32 empty Dec 13 13:57:02.729305 kernel: Normal empty Dec 13 13:57:02.729311 kernel: Movable zone start for each node Dec 13 13:57:02.729317 kernel: Early memory node ranges Dec 13 13:57:02.729323 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Dec 13 13:57:02.729329 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Dec 13 13:57:02.729335 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Dec 13 13:57:02.729340 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Dec 13 13:57:02.729347 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Dec 13 13:57:02.729353 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Dec 13 13:57:02.729359 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Dec 13 13:57:02.729365 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Dec 13 13:57:02.729372 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Dec 13 13:57:02.729378 kernel: psci: probing for conduit method from ACPI. Dec 13 13:57:02.729383 kernel: psci: PSCIv1.1 detected in firmware. Dec 13 13:57:02.729389 kernel: psci: Using standard PSCI v0.2 function IDs Dec 13 13:57:02.729395 kernel: psci: Trusted OS migration not required Dec 13 13:57:02.729403 kernel: psci: SMC Calling Convention v1.1 Dec 13 13:57:02.729409 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Dec 13 13:57:02.729417 kernel: ACPI: SRAT not present Dec 13 13:57:02.729423 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Dec 13 13:57:02.729429 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Dec 13 13:57:02.729435 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Dec 13 13:57:02.729441 kernel: Detected PIPT I-cache on CPU0 Dec 13 13:57:02.729458 kernel: CPU features: detected: GIC system register CPU interface Dec 13 13:57:02.729464 kernel: CPU features: detected: Hardware dirty bit management Dec 13 13:57:02.729470 kernel: CPU features: detected: Spectre-v4 Dec 13 13:57:02.729476 kernel: CPU features: detected: Spectre-BHB Dec 13 13:57:02.729484 kernel: CPU features: kernel page table isolation forced ON by KASLR Dec 13 13:57:02.729490 kernel: CPU features: detected: Kernel page table isolation (KPTI) Dec 13 13:57:02.729496 kernel: CPU features: detected: ARM erratum 1418040 Dec 13 13:57:02.729502 kernel: CPU features: detected: SSBS not fully self-synchronizing Dec 13 13:57:02.729508 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Dec 13 13:57:02.729514 kernel: Policy zone: DMA Dec 13 13:57:02.729521 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 13:57:02.729528 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 13:57:02.729534 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 13:57:02.729540 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 13:57:02.729546 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 13:57:02.729554 kernel: Memory: 2457396K/2572288K available (9792K kernel code, 2092K rwdata, 7576K rodata, 36416K init, 777K bss, 114892K reserved, 0K cma-reserved) Dec 13 13:57:02.729560 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 13:57:02.729566 kernel: trace event string verifier disabled Dec 13 13:57:02.729572 kernel: rcu: Preemptible hierarchical RCU implementation. Dec 13 13:57:02.729578 kernel: rcu: RCU event tracing is enabled. Dec 13 13:57:02.729585 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 13:57:02.729591 kernel: Trampoline variant of Tasks RCU enabled. Dec 13 13:57:02.729597 kernel: Tracing variant of Tasks RCU enabled. Dec 13 13:57:02.729603 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 13:57:02.729610 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 13:57:02.729616 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Dec 13 13:57:02.729623 kernel: GICv3: 256 SPIs implemented Dec 13 13:57:02.729629 kernel: GICv3: 0 Extended SPIs implemented Dec 13 13:57:02.729635 kernel: GICv3: Distributor has no Range Selector support Dec 13 13:57:02.729641 kernel: Root IRQ handler: gic_handle_irq Dec 13 13:57:02.729647 kernel: GICv3: 16 PPIs implemented Dec 13 13:57:02.729653 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Dec 13 13:57:02.729659 kernel: ACPI: SRAT not present Dec 13 13:57:02.729665 kernel: ITS [mem 0x08080000-0x0809ffff] Dec 13 13:57:02.729671 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Dec 13 13:57:02.729677 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Dec 13 13:57:02.729683 kernel: GICv3: using LPI property table @0x00000000400d0000 Dec 13 13:57:02.729690 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Dec 13 13:57:02.729697 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 13:57:02.729703 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Dec 13 13:57:02.729709 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Dec 13 13:57:02.729715 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Dec 13 13:57:02.729721 kernel: arm-pv: using stolen time PV Dec 13 13:57:02.729728 kernel: Console: colour dummy device 80x25 Dec 13 13:57:02.729734 kernel: ACPI: Core revision 20210730 Dec 13 13:57:02.729740 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Dec 13 13:57:02.729747 kernel: pid_max: default: 32768 minimum: 301 Dec 13 13:57:02.729753 kernel: LSM: Security Framework initializing Dec 13 13:57:02.729760 kernel: SELinux: Initializing. Dec 13 13:57:02.729767 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 13:57:02.729773 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 13:57:02.729779 kernel: rcu: Hierarchical SRCU implementation. Dec 13 13:57:02.729786 kernel: Platform MSI: ITS@0x8080000 domain created Dec 13 13:57:02.729792 kernel: PCI/MSI: ITS@0x8080000 domain created Dec 13 13:57:02.729798 kernel: Remapping and enabling EFI services. Dec 13 13:57:02.729809 kernel: smp: Bringing up secondary CPUs ... Dec 13 13:57:02.729815 kernel: Detected PIPT I-cache on CPU1 Dec 13 13:57:02.729822 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Dec 13 13:57:02.729829 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Dec 13 13:57:02.729836 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 13:57:02.729842 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Dec 13 13:57:02.729848 kernel: Detected PIPT I-cache on CPU2 Dec 13 13:57:02.729855 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Dec 13 13:57:02.729861 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Dec 13 13:57:02.729868 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 13:57:02.729874 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Dec 13 13:57:02.729880 kernel: Detected PIPT I-cache on CPU3 Dec 13 13:57:02.729887 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Dec 13 13:57:02.729894 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Dec 13 13:57:02.729900 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 13:57:02.729906 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Dec 13 13:57:02.729916 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 13:57:02.729924 kernel: SMP: Total of 4 processors activated. Dec 13 13:57:02.729930 kernel: CPU features: detected: 32-bit EL0 Support Dec 13 13:57:02.729937 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Dec 13 13:57:02.729944 kernel: CPU features: detected: Common not Private translations Dec 13 13:57:02.729950 kernel: CPU features: detected: CRC32 instructions Dec 13 13:57:02.729957 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Dec 13 13:57:02.729963 kernel: CPU features: detected: LSE atomic instructions Dec 13 13:57:02.729971 kernel: CPU features: detected: Privileged Access Never Dec 13 13:57:02.729977 kernel: CPU features: detected: RAS Extension Support Dec 13 13:57:02.729984 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Dec 13 13:57:02.729991 kernel: CPU: All CPU(s) started at EL1 Dec 13 13:57:02.729997 kernel: alternatives: patching kernel code Dec 13 13:57:02.730005 kernel: devtmpfs: initialized Dec 13 13:57:02.730011 kernel: KASLR enabled Dec 13 13:57:02.730018 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 13:57:02.730025 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 13:57:02.730031 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 13:57:02.730044 kernel: SMBIOS 3.0.0 present. Dec 13 13:57:02.730051 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Dec 13 13:57:02.730058 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 13:57:02.730064 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Dec 13 13:57:02.730072 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 13 13:57:02.730079 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 13 13:57:02.730086 kernel: audit: initializing netlink subsys (disabled) Dec 13 13:57:02.730092 kernel: audit: type=2000 audit(0.031:1): state=initialized audit_enabled=0 res=1 Dec 13 13:57:02.730099 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 13:57:02.730106 kernel: cpuidle: using governor menu Dec 13 13:57:02.730112 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Dec 13 13:57:02.730119 kernel: ASID allocator initialised with 32768 entries Dec 13 13:57:02.730125 kernel: ACPI: bus type PCI registered Dec 13 13:57:02.730133 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 13:57:02.730140 kernel: Serial: AMBA PL011 UART driver Dec 13 13:57:02.730146 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 13:57:02.730153 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Dec 13 13:57:02.730159 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 13:57:02.730166 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Dec 13 13:57:02.730172 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 13:57:02.730179 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Dec 13 13:57:02.730186 kernel: ACPI: Added _OSI(Module Device) Dec 13 13:57:02.730193 kernel: ACPI: Added _OSI(Processor Device) Dec 13 13:57:02.730200 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 13:57:02.730207 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 13:57:02.730213 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 13:57:02.730220 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 13:57:02.730226 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 13:57:02.730233 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 13:57:02.730240 kernel: ACPI: Interpreter enabled Dec 13 13:57:02.730246 kernel: ACPI: Using GIC for interrupt routing Dec 13 13:57:02.730254 kernel: ACPI: MCFG table detected, 1 entries Dec 13 13:57:02.730261 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Dec 13 13:57:02.730267 kernel: printk: console [ttyAMA0] enabled Dec 13 13:57:02.730274 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 13:57:02.730391 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 13:57:02.730469 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Dec 13 13:57:02.730527 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Dec 13 13:57:02.730586 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Dec 13 13:57:02.730641 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Dec 13 13:57:02.730650 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Dec 13 13:57:02.730656 kernel: PCI host bridge to bus 0000:00 Dec 13 13:57:02.730722 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Dec 13 13:57:02.730787 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Dec 13 13:57:02.730840 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Dec 13 13:57:02.730890 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 13:57:02.730986 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Dec 13 13:57:02.731094 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 13:57:02.731159 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Dec 13 13:57:02.731218 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Dec 13 13:57:02.731277 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Dec 13 13:57:02.731335 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Dec 13 13:57:02.731395 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Dec 13 13:57:02.731466 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Dec 13 13:57:02.731522 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Dec 13 13:57:02.731575 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Dec 13 13:57:02.731630 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Dec 13 13:57:02.731638 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Dec 13 13:57:02.731645 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Dec 13 13:57:02.731652 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Dec 13 13:57:02.731661 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Dec 13 13:57:02.731667 kernel: iommu: Default domain type: Translated Dec 13 13:57:02.731674 kernel: iommu: DMA domain TLB invalidation policy: strict mode Dec 13 13:57:02.731681 kernel: vgaarb: loaded Dec 13 13:57:02.731687 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 13:57:02.731694 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 13:57:02.731701 kernel: PTP clock support registered Dec 13 13:57:02.731708 kernel: Registered efivars operations Dec 13 13:57:02.731714 kernel: clocksource: Switched to clocksource arch_sys_counter Dec 13 13:57:02.731722 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 13:57:02.731729 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 13:57:02.731735 kernel: pnp: PnP ACPI init Dec 13 13:57:02.731798 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Dec 13 13:57:02.731807 kernel: pnp: PnP ACPI: found 1 devices Dec 13 13:57:02.731814 kernel: NET: Registered PF_INET protocol family Dec 13 13:57:02.731821 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 13:57:02.731828 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 13:57:02.731836 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 13:57:02.731843 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 13:57:02.731849 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 13:57:02.731856 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 13:57:02.731863 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 13:57:02.731869 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 13:57:02.731876 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 13:57:02.731883 kernel: PCI: CLS 0 bytes, default 64 Dec 13 13:57:02.731889 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Dec 13 13:57:02.731897 kernel: kvm [1]: HYP mode not available Dec 13 13:57:02.731904 kernel: Initialise system trusted keyrings Dec 13 13:57:02.731910 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 13:57:02.731917 kernel: Key type asymmetric registered Dec 13 13:57:02.731924 kernel: Asymmetric key parser 'x509' registered Dec 13 13:57:02.731931 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 13:57:02.731937 kernel: io scheduler mq-deadline registered Dec 13 13:57:02.731943 kernel: io scheduler kyber registered Dec 13 13:57:02.731950 kernel: io scheduler bfq registered Dec 13 13:57:02.731958 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Dec 13 13:57:02.731965 kernel: ACPI: button: Power Button [PWRB] Dec 13 13:57:02.731972 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Dec 13 13:57:02.732029 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Dec 13 13:57:02.732044 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 13:57:02.732051 kernel: thunder_xcv, ver 1.0 Dec 13 13:57:02.732058 kernel: thunder_bgx, ver 1.0 Dec 13 13:57:02.732064 kernel: nicpf, ver 1.0 Dec 13 13:57:02.732071 kernel: nicvf, ver 1.0 Dec 13 13:57:02.732140 kernel: rtc-efi rtc-efi.0: registered as rtc0 Dec 13 13:57:02.732195 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-12-13T13:57:02 UTC (1734098222) Dec 13 13:57:02.732204 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 13:57:02.732211 kernel: NET: Registered PF_INET6 protocol family Dec 13 13:57:02.732217 kernel: Segment Routing with IPv6 Dec 13 13:57:02.732224 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 13:57:02.732230 kernel: NET: Registered PF_PACKET protocol family Dec 13 13:57:02.732237 kernel: Key type dns_resolver registered Dec 13 13:57:02.732246 kernel: registered taskstats version 1 Dec 13 13:57:02.732252 kernel: Loading compiled-in X.509 certificates Dec 13 13:57:02.732259 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e011ba9949ade5a6d03f7a5e28171f7f59e70f8a' Dec 13 13:57:02.732266 kernel: Key type .fscrypt registered Dec 13 13:57:02.732273 kernel: Key type fscrypt-provisioning registered Dec 13 13:57:02.732279 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 13:57:02.732286 kernel: ima: Allocated hash algorithm: sha1 Dec 13 13:57:02.732292 kernel: ima: No architecture policies found Dec 13 13:57:02.732299 kernel: clk: Disabling unused clocks Dec 13 13:57:02.732307 kernel: Freeing unused kernel memory: 36416K Dec 13 13:57:02.732313 kernel: Run /init as init process Dec 13 13:57:02.732320 kernel: with arguments: Dec 13 13:57:02.732326 kernel: /init Dec 13 13:57:02.732333 kernel: with environment: Dec 13 13:57:02.732339 kernel: HOME=/ Dec 13 13:57:02.732346 kernel: TERM=linux Dec 13 13:57:02.732352 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 13:57:02.732361 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 13:57:02.732370 systemd[1]: Detected virtualization kvm. Dec 13 13:57:02.732378 systemd[1]: Detected architecture arm64. Dec 13 13:57:02.732385 systemd[1]: Running in initrd. Dec 13 13:57:02.732391 systemd[1]: No hostname configured, using default hostname. Dec 13 13:57:02.732398 systemd[1]: Hostname set to . Dec 13 13:57:02.732406 systemd[1]: Initializing machine ID from VM UUID. Dec 13 13:57:02.732413 systemd[1]: Queued start job for default target initrd.target. Dec 13 13:57:02.732421 systemd[1]: Started systemd-ask-password-console.path. Dec 13 13:57:02.732427 systemd[1]: Reached target cryptsetup.target. Dec 13 13:57:02.732434 systemd[1]: Reached target paths.target. Dec 13 13:57:02.732441 systemd[1]: Reached target slices.target. Dec 13 13:57:02.732478 systemd[1]: Reached target swap.target. Dec 13 13:57:02.732486 systemd[1]: Reached target timers.target. Dec 13 13:57:02.732494 systemd[1]: Listening on iscsid.socket. Dec 13 13:57:02.732503 systemd[1]: Listening on iscsiuio.socket. Dec 13 13:57:02.732510 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 13:57:02.732517 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 13:57:02.732524 systemd[1]: Listening on systemd-journald.socket. Dec 13 13:57:02.732531 systemd[1]: Listening on systemd-networkd.socket. Dec 13 13:57:02.732552 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 13:57:02.732559 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 13:57:02.732566 systemd[1]: Reached target sockets.target. Dec 13 13:57:02.732573 systemd[1]: Starting kmod-static-nodes.service... Dec 13 13:57:02.732582 systemd[1]: Finished network-cleanup.service. Dec 13 13:57:02.732589 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 13:57:02.732595 systemd[1]: Starting systemd-journald.service... Dec 13 13:57:02.732602 systemd[1]: Starting systemd-modules-load.service... Dec 13 13:57:02.732609 systemd[1]: Starting systemd-resolved.service... Dec 13 13:57:02.732616 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 13:57:02.732623 systemd[1]: Finished kmod-static-nodes.service. Dec 13 13:57:02.732630 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 13:57:02.732637 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 13:57:02.732645 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 13:57:02.732655 systemd-journald[291]: Journal started Dec 13 13:57:02.732694 systemd-journald[291]: Runtime Journal (/run/log/journal/46eb39328a3b48ce98eae9c6137d4749) is 6.0M, max 48.7M, 42.6M free. Dec 13 13:57:02.726956 systemd-modules-load[292]: Inserted module 'overlay' Dec 13 13:57:02.736983 kernel: audit: type=1130 audit(1734098222.732:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:02.737002 systemd[1]: Started systemd-journald.service. Dec 13 13:57:02.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:02.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:02.738102 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 13:57:02.742279 kernel: audit: type=1130 audit(1734098222.737:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:02.743880 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 13:57:02.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:02.748468 kernel: audit: type=1130 audit(1734098222.742:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:02.754896 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 13:57:02.754677 systemd-resolved[293]: Positive Trust Anchors: Dec 13 13:57:02.754684 systemd-resolved[293]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 13:57:02.754714 systemd-resolved[293]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 13:57:02.764200 kernel: Bridge firewalling registered Dec 13 13:57:02.759340 systemd-resolved[293]: Defaulting to hostname 'linux'. Dec 13 13:57:02.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:02.760623 systemd[1]: Started systemd-resolved.service. Dec 13 13:57:02.770234 kernel: audit: type=1130 audit(1734098222.764:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:02.763049 systemd-modules-load[292]: Inserted module 'br_netfilter' Dec 13 13:57:02.764987 systemd[1]: Reached target nss-lookup.target. Dec 13 13:57:02.770364 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 13:57:02.776005 kernel: audit: type=1130 audit(1734098222.771:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:02.776025 kernel: SCSI subsystem initialized Dec 13 13:57:02.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:02.774935 systemd[1]: Starting dracut-cmdline.service... Dec 13 13:57:02.783498 dracut-cmdline[309]: dracut-dracut-053 Dec 13 13:57:02.785511 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 13:57:02.785528 kernel: device-mapper: uevent: version 1.0.3 Dec 13 13:57:02.785538 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 13:57:02.786204 dracut-cmdline[309]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 13:57:02.790729 systemd-modules-load[292]: Inserted module 'dm_multipath' Dec 13 13:57:02.791528 systemd[1]: Finished systemd-modules-load.service. Dec 13 13:57:02.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:02.795468 kernel: audit: type=1130 audit(1734098222.791:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:02.795883 systemd[1]: Starting systemd-sysctl.service... Dec 13 13:57:02.802605 systemd[1]: Finished systemd-sysctl.service. Dec 13 13:57:02.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:02.806475 kernel: audit: type=1130 audit(1734098222.802:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:02.847469 kernel: Loading iSCSI transport class v2.0-870. Dec 13 13:57:02.860477 kernel: iscsi: registered transport (tcp) Dec 13 13:57:02.875470 kernel: iscsi: registered transport (qla4xxx) Dec 13 13:57:02.875482 kernel: QLogic iSCSI HBA Driver Dec 13 13:57:02.909797 systemd[1]: Finished dracut-cmdline.service. Dec 13 13:57:02.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:02.913471 kernel: audit: type=1130 audit(1734098222.910:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:02.911364 systemd[1]: Starting dracut-pre-udev.service... Dec 13 13:57:02.955480 kernel: raid6: neonx8 gen() 13768 MB/s Dec 13 13:57:02.972470 kernel: raid6: neonx8 xor() 10750 MB/s Dec 13 13:57:02.989468 kernel: raid6: neonx4 gen() 13451 MB/s Dec 13 13:57:03.006464 kernel: raid6: neonx4 xor() 11250 MB/s Dec 13 13:57:03.023467 kernel: raid6: neonx2 gen() 12974 MB/s Dec 13 13:57:03.040469 kernel: raid6: neonx2 xor() 10321 MB/s Dec 13 13:57:03.057466 kernel: raid6: neonx1 gen() 10527 MB/s Dec 13 13:57:03.074466 kernel: raid6: neonx1 xor() 8769 MB/s Dec 13 13:57:03.091471 kernel: raid6: int64x8 gen() 6262 MB/s Dec 13 13:57:03.108471 kernel: raid6: int64x8 xor() 3533 MB/s Dec 13 13:57:03.125470 kernel: raid6: int64x4 gen() 7205 MB/s Dec 13 13:57:03.142469 kernel: raid6: int64x4 xor() 3854 MB/s Dec 13 13:57:03.159470 kernel: raid6: int64x2 gen() 6147 MB/s Dec 13 13:57:03.176472 kernel: raid6: int64x2 xor() 3317 MB/s Dec 13 13:57:03.193470 kernel: raid6: int64x1 gen() 5037 MB/s Dec 13 13:57:03.210670 kernel: raid6: int64x1 xor() 2641 MB/s Dec 13 13:57:03.210680 kernel: raid6: using algorithm neonx8 gen() 13768 MB/s Dec 13 13:57:03.210689 kernel: raid6: .... xor() 10750 MB/s, rmw enabled Dec 13 13:57:03.211838 kernel: raid6: using neon recovery algorithm Dec 13 13:57:03.224940 kernel: xor: measuring software checksum speed Dec 13 13:57:03.224958 kernel: 8regs : 17199 MB/sec Dec 13 13:57:03.224966 kernel: 32regs : 20670 MB/sec Dec 13 13:57:03.225612 kernel: arm64_neon : 25923 MB/sec Dec 13 13:57:03.225623 kernel: xor: using function: arm64_neon (25923 MB/sec) Dec 13 13:57:03.282472 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Dec 13 13:57:03.292376 systemd[1]: Finished dracut-pre-udev.service. Dec 13 13:57:03.296525 kernel: audit: type=1130 audit(1734098223.292:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:03.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:03.296000 audit: BPF prog-id=7 op=LOAD Dec 13 13:57:03.296000 audit: BPF prog-id=8 op=LOAD Dec 13 13:57:03.296917 systemd[1]: Starting systemd-udevd.service... Dec 13 13:57:03.313029 systemd-udevd[491]: Using default interface naming scheme 'v252'. Dec 13 13:57:03.316429 systemd[1]: Started systemd-udevd.service. Dec 13 13:57:03.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:03.318502 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 13:57:03.329569 dracut-pre-trigger[499]: rd.md=0: removing MD RAID activation Dec 13 13:57:03.358008 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 13:57:03.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:03.359718 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 13:57:03.393479 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 13:57:03.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:03.424475 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 13:57:03.430473 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 13:57:03.430489 kernel: GPT:9289727 != 19775487 Dec 13 13:57:03.430498 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 13:57:03.430507 kernel: GPT:9289727 != 19775487 Dec 13 13:57:03.430515 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 13:57:03.430528 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 13:57:03.446482 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (561) Dec 13 13:57:03.449835 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 13:57:03.454847 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 13:57:03.455829 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 13:57:03.460144 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 13:57:03.463610 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 13:57:03.465383 systemd[1]: Starting disk-uuid.service... Dec 13 13:57:03.471318 disk-uuid[568]: Primary Header is updated. Dec 13 13:57:03.471318 disk-uuid[568]: Secondary Entries is updated. Dec 13 13:57:03.471318 disk-uuid[568]: Secondary Header is updated. Dec 13 13:57:03.474547 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 13:57:04.484969 disk-uuid[569]: The operation has completed successfully. Dec 13 13:57:04.486905 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 13:57:04.515155 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 13:57:04.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:04.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:04.515262 systemd[1]: Finished disk-uuid.service. Dec 13 13:57:04.516921 systemd[1]: Starting verity-setup.service... Dec 13 13:57:04.533471 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Dec 13 13:57:04.553412 systemd[1]: Found device dev-mapper-usr.device. Dec 13 13:57:04.555777 systemd[1]: Mounting sysusr-usr.mount... Dec 13 13:57:04.557500 systemd[1]: Finished verity-setup.service. Dec 13 13:57:04.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:04.601479 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 13:57:04.601576 systemd[1]: Mounted sysusr-usr.mount. Dec 13 13:57:04.602439 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 13:57:04.603218 systemd[1]: Starting ignition-setup.service... Dec 13 13:57:04.605380 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 13:57:04.611823 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 13:57:04.611858 kernel: BTRFS info (device vda6): using free space tree Dec 13 13:57:04.611873 kernel: BTRFS info (device vda6): has skinny extents Dec 13 13:57:04.620302 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 13:57:04.627156 systemd[1]: Finished ignition-setup.service. Dec 13 13:57:04.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:04.628845 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 13:57:04.691836 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 13:57:04.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:04.693000 audit: BPF prog-id=9 op=LOAD Dec 13 13:57:04.694221 systemd[1]: Starting systemd-networkd.service... Dec 13 13:57:04.709732 ignition[650]: Ignition 2.14.0 Dec 13 13:57:04.709744 ignition[650]: Stage: fetch-offline Dec 13 13:57:04.709784 ignition[650]: no configs at "/usr/lib/ignition/base.d" Dec 13 13:57:04.709793 ignition[650]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 13:57:04.709930 ignition[650]: parsed url from cmdline: "" Dec 13 13:57:04.709933 ignition[650]: no config URL provided Dec 13 13:57:04.709938 ignition[650]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 13:57:04.709945 ignition[650]: no config at "/usr/lib/ignition/user.ign" Dec 13 13:57:04.709966 ignition[650]: op(1): [started] loading QEMU firmware config module Dec 13 13:57:04.709971 ignition[650]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 13:57:04.713989 ignition[650]: op(1): [finished] loading QEMU firmware config module Dec 13 13:57:04.722844 systemd-networkd[746]: lo: Link UP Dec 13 13:57:04.722861 systemd-networkd[746]: lo: Gained carrier Dec 13 13:57:04.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:04.723249 systemd-networkd[746]: Enumeration completed Dec 13 13:57:04.723438 systemd-networkd[746]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 13:57:04.723562 systemd[1]: Started systemd-networkd.service. Dec 13 13:57:04.724620 systemd-networkd[746]: eth0: Link UP Dec 13 13:57:04.724624 systemd-networkd[746]: eth0: Gained carrier Dec 13 13:57:04.724996 systemd[1]: Reached target network.target. Dec 13 13:57:04.728025 systemd[1]: Starting iscsiuio.service... Dec 13 13:57:04.738666 systemd[1]: Started iscsiuio.service. Dec 13 13:57:04.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:04.740331 systemd[1]: Starting iscsid.service... Dec 13 13:57:04.741073 systemd-networkd[746]: eth0: DHCPv4 address 10.0.0.25/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 13:57:04.744025 iscsid[752]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 13:57:04.744025 iscsid[752]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 13:57:04.744025 iscsid[752]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 13:57:04.744025 iscsid[752]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 13:57:04.744025 iscsid[752]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 13:57:04.744025 iscsid[752]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 13:57:04.744025 iscsid[752]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 13:57:04.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:04.746707 systemd[1]: Started iscsid.service. Dec 13 13:57:04.750799 systemd[1]: Starting dracut-initqueue.service... Dec 13 13:57:04.761083 systemd[1]: Finished dracut-initqueue.service. Dec 13 13:57:04.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:04.762152 systemd[1]: Reached target remote-fs-pre.target. Dec 13 13:57:04.763722 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 13:57:04.765335 systemd[1]: Reached target remote-fs.target. Dec 13 13:57:04.767884 systemd[1]: Starting dracut-pre-mount.service... Dec 13 13:57:04.775714 systemd[1]: Finished dracut-pre-mount.service. Dec 13 13:57:04.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:04.785058 ignition[650]: parsing config with SHA512: fae36afa7d25f7ea4a388073bb9a0236bb26cf24ab30c3782a47a3535a077ad4d320c38c1dc4b0926d88b66dc30ab0a95145fda97f9b2659b1271c10e63ad269 Dec 13 13:57:04.792280 unknown[650]: fetched base config from "system" Dec 13 13:57:04.792814 ignition[650]: fetch-offline: fetch-offline passed Dec 13 13:57:04.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:04.792290 unknown[650]: fetched user config from "qemu" Dec 13 13:57:04.792888 ignition[650]: Ignition finished successfully Dec 13 13:57:04.793724 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 13:57:04.794818 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 13:57:04.795652 systemd[1]: Starting ignition-kargs.service... Dec 13 13:57:04.804712 ignition[767]: Ignition 2.14.0 Dec 13 13:57:04.804730 ignition[767]: Stage: kargs Dec 13 13:57:04.804840 ignition[767]: no configs at "/usr/lib/ignition/base.d" Dec 13 13:57:04.804850 ignition[767]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 13:57:04.805907 ignition[767]: kargs: kargs passed Dec 13 13:57:04.807913 systemd[1]: Finished ignition-kargs.service. Dec 13 13:57:04.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:04.805955 ignition[767]: Ignition finished successfully Dec 13 13:57:04.809947 systemd[1]: Starting ignition-disks.service... Dec 13 13:57:04.816996 ignition[773]: Ignition 2.14.0 Dec 13 13:57:04.817006 ignition[773]: Stage: disks Dec 13 13:57:04.817129 ignition[773]: no configs at "/usr/lib/ignition/base.d" Dec 13 13:57:04.819122 systemd[1]: Finished ignition-disks.service. Dec 13 13:57:04.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:04.817139 ignition[773]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 13:57:04.824315 systemd[1]: Reached target initrd-root-device.target. Dec 13 13:57:04.818058 ignition[773]: disks: disks passed Dec 13 13:57:04.825587 systemd[1]: Reached target local-fs-pre.target. Dec 13 13:57:04.818104 ignition[773]: Ignition finished successfully Dec 13 13:57:04.827115 systemd[1]: Reached target local-fs.target. Dec 13 13:57:04.827861 systemd[1]: Reached target sysinit.target. Dec 13 13:57:04.828562 systemd[1]: Reached target basic.target. Dec 13 13:57:04.830142 systemd[1]: Starting systemd-fsck-root.service... Dec 13 13:57:04.841087 systemd-fsck[781]: ROOT: clean, 621/553520 files, 56020/553472 blocks Dec 13 13:57:04.845016 systemd[1]: Finished systemd-fsck-root.service. Dec 13 13:57:04.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:04.846656 systemd[1]: Mounting sysroot.mount... Dec 13 13:57:04.851470 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 13:57:04.852015 systemd[1]: Mounted sysroot.mount. Dec 13 13:57:04.852788 systemd[1]: Reached target initrd-root-fs.target. Dec 13 13:57:04.855442 systemd[1]: Mounting sysroot-usr.mount... Dec 13 13:57:04.856309 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 13:57:04.856346 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 13:57:04.856370 systemd[1]: Reached target ignition-diskful.target. Dec 13 13:57:04.858076 systemd[1]: Mounted sysroot-usr.mount. Dec 13 13:57:04.859922 systemd[1]: Starting initrd-setup-root.service... Dec 13 13:57:04.864248 initrd-setup-root[791]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 13:57:04.868898 initrd-setup-root[799]: cut: /sysroot/etc/group: No such file or directory Dec 13 13:57:04.872929 initrd-setup-root[807]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 13:57:04.876367 initrd-setup-root[815]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 13:57:04.905745 systemd[1]: Finished initrd-setup-root.service. Dec 13 13:57:04.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:04.907397 systemd[1]: Starting ignition-mount.service... Dec 13 13:57:04.908792 systemd[1]: Starting sysroot-boot.service... Dec 13 13:57:04.912996 bash[832]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 13:57:04.922015 ignition[834]: INFO : Ignition 2.14.0 Dec 13 13:57:04.922015 ignition[834]: INFO : Stage: mount Dec 13 13:57:04.924213 ignition[834]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 13:57:04.924213 ignition[834]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 13:57:04.924213 ignition[834]: INFO : mount: mount passed Dec 13 13:57:04.924213 ignition[834]: INFO : Ignition finished successfully Dec 13 13:57:04.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:04.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:04.925554 systemd[1]: Finished ignition-mount.service. Dec 13 13:57:04.927761 systemd[1]: Finished sysroot-boot.service. Dec 13 13:57:05.564585 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 13:57:05.570475 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (842) Dec 13 13:57:05.573031 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 13:57:05.573046 kernel: BTRFS info (device vda6): using free space tree Dec 13 13:57:05.573056 kernel: BTRFS info (device vda6): has skinny extents Dec 13 13:57:05.575752 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 13:57:05.577286 systemd[1]: Starting ignition-files.service... Dec 13 13:57:05.590613 ignition[862]: INFO : Ignition 2.14.0 Dec 13 13:57:05.590613 ignition[862]: INFO : Stage: files Dec 13 13:57:05.592152 ignition[862]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 13:57:05.592152 ignition[862]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 13:57:05.592152 ignition[862]: DEBUG : files: compiled without relabeling support, skipping Dec 13 13:57:05.595877 ignition[862]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 13:57:05.595877 ignition[862]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 13:57:05.598731 ignition[862]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 13:57:05.598731 ignition[862]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 13:57:05.598731 ignition[862]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 13:57:05.598576 unknown[862]: wrote ssh authorized keys file for user: core Dec 13 13:57:05.603736 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Dec 13 13:57:05.603736 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Dec 13 13:57:06.101558 systemd-networkd[746]: eth0: Gained IPv6LL Dec 13 13:57:06.322666 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 13:57:06.827809 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Dec 13 13:57:06.830125 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 13:57:06.830125 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 13:57:06.830125 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 13:57:06.830125 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 13:57:06.830125 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 13:57:06.830125 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 13:57:06.830125 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 13:57:06.830125 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 13:57:06.830125 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 13:57:06.830125 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 13:57:06.830125 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 13:57:06.830125 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 13:57:06.830125 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 13:57:06.830125 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-arm64.raw: attempt #1 Dec 13 13:57:07.170189 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 13:57:07.559548 ignition[862]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 13:57:07.559548 ignition[862]: INFO : files: op(b): [started] processing unit "prepare-helm.service" Dec 13 13:57:07.563479 ignition[862]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 13:57:07.563479 ignition[862]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 13:57:07.563479 ignition[862]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" Dec 13 13:57:07.563479 ignition[862]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Dec 13 13:57:07.563479 ignition[862]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 13:57:07.563479 ignition[862]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 13:57:07.563479 ignition[862]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Dec 13 13:57:07.563479 ignition[862]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Dec 13 13:57:07.563479 ignition[862]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 13:57:07.563479 ignition[862]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 13:57:07.563479 ignition[862]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 13:57:07.592286 ignition[862]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 13:57:07.594683 ignition[862]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 13:57:07.594683 ignition[862]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 13:57:07.594683 ignition[862]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 13:57:07.594683 ignition[862]: INFO : files: files passed Dec 13 13:57:07.594683 ignition[862]: INFO : Ignition finished successfully Dec 13 13:57:07.606313 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 13:57:07.606334 kernel: audit: type=1130 audit(1734098227.596:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.594765 systemd[1]: Finished ignition-files.service. Dec 13 13:57:07.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.597760 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 13:57:07.613302 kernel: audit: type=1130 audit(1734098227.606:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.613320 kernel: audit: type=1131 audit(1734098227.606:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.613394 initrd-setup-root-after-ignition[887]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 13:57:07.617905 kernel: audit: type=1130 audit(1734098227.613:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.602192 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 13:57:07.620358 initrd-setup-root-after-ignition[890]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 13:57:07.602906 systemd[1]: Starting ignition-quench.service... Dec 13 13:57:07.606077 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 13:57:07.606513 systemd[1]: Finished ignition-quench.service. Dec 13 13:57:07.610820 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 13:57:07.614372 systemd[1]: Reached target ignition-complete.target. Dec 13 13:57:07.619333 systemd[1]: Starting initrd-parse-etc.service... Dec 13 13:57:07.631242 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 13:57:07.631330 systemd[1]: Finished initrd-parse-etc.service. Dec 13 13:57:07.638060 kernel: audit: type=1130 audit(1734098227.632:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.638079 kernel: audit: type=1131 audit(1734098227.632:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.633062 systemd[1]: Reached target initrd-fs.target. Dec 13 13:57:07.638812 systemd[1]: Reached target initrd.target. Dec 13 13:57:07.640123 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 13:57:07.640844 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 13:57:07.650916 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 13:57:07.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.652445 systemd[1]: Starting initrd-cleanup.service... Dec 13 13:57:07.655953 kernel: audit: type=1130 audit(1734098227.651:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.660114 systemd[1]: Stopped target nss-lookup.target. Dec 13 13:57:07.661028 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 13:57:07.662417 systemd[1]: Stopped target timers.target. Dec 13 13:57:07.663692 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 13:57:07.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.663794 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 13:57:07.669210 kernel: audit: type=1131 audit(1734098227.664:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.665078 systemd[1]: Stopped target initrd.target. Dec 13 13:57:07.668714 systemd[1]: Stopped target basic.target. Dec 13 13:57:07.669965 systemd[1]: Stopped target ignition-complete.target. Dec 13 13:57:07.671389 systemd[1]: Stopped target ignition-diskful.target. Dec 13 13:57:07.672698 systemd[1]: Stopped target initrd-root-device.target. Dec 13 13:57:07.674150 systemd[1]: Stopped target remote-fs.target. Dec 13 13:57:07.675480 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 13:57:07.676800 systemd[1]: Stopped target sysinit.target. Dec 13 13:57:07.678074 systemd[1]: Stopped target local-fs.target. Dec 13 13:57:07.679305 systemd[1]: Stopped target local-fs-pre.target. Dec 13 13:57:07.680534 systemd[1]: Stopped target swap.target. Dec 13 13:57:07.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.681740 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 13:57:07.687305 kernel: audit: type=1131 audit(1734098227.682:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.681846 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 13:57:07.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.683168 systemd[1]: Stopped target cryptsetup.target. Dec 13 13:57:07.692206 kernel: audit: type=1131 audit(1734098227.687:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.686585 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 13:57:07.686684 systemd[1]: Stopped dracut-initqueue.service. Dec 13 13:57:07.688168 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 13:57:07.688264 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 13:57:07.691815 systemd[1]: Stopped target paths.target. Dec 13 13:57:07.692943 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 13:57:07.696489 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 13:57:07.697736 systemd[1]: Stopped target slices.target. Dec 13 13:57:07.699230 systemd[1]: Stopped target sockets.target. Dec 13 13:57:07.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.700519 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 13:57:07.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.700628 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 13:57:07.705416 iscsid[752]: iscsid shutting down. Dec 13 13:57:07.701940 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 13:57:07.702040 systemd[1]: Stopped ignition-files.service. Dec 13 13:57:07.703953 systemd[1]: Stopping ignition-mount.service... Dec 13 13:57:07.704836 systemd[1]: Stopping iscsid.service... Dec 13 13:57:07.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.706646 systemd[1]: Stopping sysroot-boot.service... Dec 13 13:57:07.707933 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 13:57:07.708083 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 13:57:07.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.714521 ignition[903]: INFO : Ignition 2.14.0 Dec 13 13:57:07.714521 ignition[903]: INFO : Stage: umount Dec 13 13:57:07.714521 ignition[903]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 13:57:07.714521 ignition[903]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 13:57:07.709399 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 13:57:07.722040 ignition[903]: INFO : umount: umount passed Dec 13 13:57:07.722040 ignition[903]: INFO : Ignition finished successfully Dec 13 13:57:07.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.709500 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 13:57:07.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.712077 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 13:57:07.712165 systemd[1]: Stopped iscsid.service. Dec 13 13:57:07.714073 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 13:57:07.714138 systemd[1]: Closed iscsid.socket. Dec 13 13:57:07.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.715257 systemd[1]: Stopping iscsiuio.service... Dec 13 13:57:07.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.719534 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 13:57:07.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.719945 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 13:57:07.720036 systemd[1]: Stopped iscsiuio.service. Dec 13 13:57:07.723428 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 13:57:07.723519 systemd[1]: Finished initrd-cleanup.service. Dec 13 13:57:07.724861 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 13:57:07.724937 systemd[1]: Stopped ignition-mount.service. Dec 13 13:57:07.727938 systemd[1]: Stopped target network.target. Dec 13 13:57:07.729519 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 13:57:07.729560 systemd[1]: Closed iscsiuio.socket. Dec 13 13:57:07.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.731901 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 13:57:07.731947 systemd[1]: Stopped ignition-disks.service. Dec 13 13:57:07.733340 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 13:57:07.733382 systemd[1]: Stopped ignition-kargs.service. Dec 13 13:57:07.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.734817 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 13:57:07.752000 audit: BPF prog-id=6 op=UNLOAD Dec 13 13:57:07.734855 systemd[1]: Stopped ignition-setup.service. Dec 13 13:57:07.736310 systemd[1]: Stopping systemd-networkd.service... Dec 13 13:57:07.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.737994 systemd[1]: Stopping systemd-resolved.service... Dec 13 13:57:07.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.744329 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 13:57:07.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.744423 systemd[1]: Stopped systemd-resolved.service. Dec 13 13:57:07.748031 systemd-networkd[746]: eth0: DHCPv6 lease lost Dec 13 13:57:07.749164 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 13:57:07.749260 systemd[1]: Stopped systemd-networkd.service. Dec 13 13:57:07.751004 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 13:57:07.751047 systemd[1]: Closed systemd-networkd.socket. Dec 13 13:57:07.753119 systemd[1]: Stopping network-cleanup.service... Dec 13 13:57:07.763000 audit: BPF prog-id=9 op=UNLOAD Dec 13 13:57:07.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.753861 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 13:57:07.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.753919 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 13:57:07.755418 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 13:57:07.755485 systemd[1]: Stopped systemd-sysctl.service. Dec 13 13:57:07.757700 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 13:57:07.757741 systemd[1]: Stopped systemd-modules-load.service. Dec 13 13:57:07.758894 systemd[1]: Stopping systemd-udevd.service... Dec 13 13:57:07.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.763865 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 13:57:07.764377 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 13:57:07.764502 systemd[1]: Stopped sysroot-boot.service. Dec 13 13:57:07.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.766753 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 13:57:07.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.766805 systemd[1]: Stopped initrd-setup-root.service. Dec 13 13:57:07.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.769276 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 13:57:07.769363 systemd[1]: Stopped network-cleanup.service. Dec 13 13:57:07.775201 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 13:57:07.775316 systemd[1]: Stopped systemd-udevd.service. Dec 13 13:57:07.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.776553 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 13:57:07.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.776590 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 13:57:07.777874 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 13:57:07.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.777908 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 13:57:07.779663 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 13:57:07.779713 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 13:57:07.781314 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 13:57:07.781356 systemd[1]: Stopped dracut-cmdline.service. Dec 13 13:57:07.782548 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 13:57:07.782591 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 13:57:07.784888 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 13:57:07.786415 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 13:57:07.786491 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 13:57:07.788723 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 13:57:07.788768 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 13:57:07.789658 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 13:57:07.789703 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 13:57:07.791842 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 13:57:07.792287 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 13:57:07.792387 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 13:57:07.793769 systemd[1]: Reached target initrd-switch-root.target. Dec 13 13:57:07.796001 systemd[1]: Starting initrd-switch-root.service... Dec 13 13:57:07.802763 systemd[1]: Switching root. Dec 13 13:57:07.821907 systemd-journald[291]: Journal stopped Dec 13 13:57:09.810121 systemd-journald[291]: Received SIGTERM from PID 1 (systemd). Dec 13 13:57:09.812100 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 13:57:09.812125 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 13:57:09.812136 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 13:57:09.812150 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 13:57:09.812167 kernel: SELinux: policy capability open_perms=1 Dec 13 13:57:09.812178 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 13:57:09.812188 kernel: SELinux: policy capability always_check_network=0 Dec 13 13:57:09.812197 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 13:57:09.812207 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 13:57:09.812216 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 13:57:09.812226 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 13:57:09.812236 systemd[1]: Successfully loaded SELinux policy in 33.230ms. Dec 13 13:57:09.812253 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.761ms. Dec 13 13:57:09.812266 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 13:57:09.812277 systemd[1]: Detected virtualization kvm. Dec 13 13:57:09.812288 systemd[1]: Detected architecture arm64. Dec 13 13:57:09.812298 systemd[1]: Detected first boot. Dec 13 13:57:09.812309 systemd[1]: Initializing machine ID from VM UUID. Dec 13 13:57:09.812320 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 13:57:09.812333 systemd[1]: Populated /etc with preset unit settings. Dec 13 13:57:09.812345 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 13:57:09.812357 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 13:57:09.812369 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 13:57:09.812380 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 13:57:09.812391 systemd[1]: Stopped initrd-switch-root.service. Dec 13 13:57:09.812403 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 13:57:09.812414 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 13:57:09.812424 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 13:57:09.812435 systemd[1]: Created slice system-getty.slice. Dec 13 13:57:09.812476 systemd[1]: Created slice system-modprobe.slice. Dec 13 13:57:09.812488 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 13:57:09.812499 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 13:57:09.812509 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 13:57:09.812519 systemd[1]: Created slice user.slice. Dec 13 13:57:09.812532 systemd[1]: Started systemd-ask-password-console.path. Dec 13 13:57:09.812544 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 13:57:09.812554 systemd[1]: Set up automount boot.automount. Dec 13 13:57:09.812564 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 13:57:09.812574 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 13:57:09.812585 systemd[1]: Stopped target initrd-fs.target. Dec 13 13:57:09.812595 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 13:57:09.812606 systemd[1]: Reached target integritysetup.target. Dec 13 13:57:09.812617 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 13:57:09.812627 systemd[1]: Reached target remote-fs.target. Dec 13 13:57:09.812637 systemd[1]: Reached target slices.target. Dec 13 13:57:09.812648 systemd[1]: Reached target swap.target. Dec 13 13:57:09.812658 systemd[1]: Reached target torcx.target. Dec 13 13:57:09.812668 systemd[1]: Reached target veritysetup.target. Dec 13 13:57:09.812678 systemd[1]: Listening on systemd-coredump.socket. Dec 13 13:57:09.812688 systemd[1]: Listening on systemd-initctl.socket. Dec 13 13:57:09.812699 systemd[1]: Listening on systemd-networkd.socket. Dec 13 13:57:09.812711 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 13:57:09.812722 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 13:57:09.812732 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 13:57:09.812743 systemd[1]: Mounting dev-hugepages.mount... Dec 13 13:57:09.812753 systemd[1]: Mounting dev-mqueue.mount... Dec 13 13:57:09.812764 systemd[1]: Mounting media.mount... Dec 13 13:57:09.812774 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 13:57:09.812784 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 13:57:09.812795 systemd[1]: Mounting tmp.mount... Dec 13 13:57:09.812806 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 13:57:09.812816 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 13:57:09.812826 systemd[1]: Starting kmod-static-nodes.service... Dec 13 13:57:09.812837 systemd[1]: Starting modprobe@configfs.service... Dec 13 13:57:09.812865 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 13:57:09.812875 systemd[1]: Starting modprobe@drm.service... Dec 13 13:57:09.812890 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 13:57:09.812903 systemd[1]: Starting modprobe@fuse.service... Dec 13 13:57:09.812914 systemd[1]: Starting modprobe@loop.service... Dec 13 13:57:09.812926 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 13:57:09.812940 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 13:57:09.812950 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 13:57:09.812961 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 13:57:09.812971 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 13:57:09.812982 systemd[1]: Stopped systemd-journald.service. Dec 13 13:57:09.812993 kernel: fuse: init (API version 7.34) Dec 13 13:57:09.813003 systemd[1]: Starting systemd-journald.service... Dec 13 13:57:09.813019 kernel: loop: module loaded Dec 13 13:57:09.813032 systemd[1]: Starting systemd-modules-load.service... Dec 13 13:57:09.813043 systemd[1]: Starting systemd-network-generator.service... Dec 13 13:57:09.813053 systemd[1]: Starting systemd-remount-fs.service... Dec 13 13:57:09.813063 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 13:57:09.813074 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 13:57:09.813084 systemd[1]: Stopped verity-setup.service. Dec 13 13:57:09.813095 systemd[1]: Mounted dev-hugepages.mount. Dec 13 13:57:09.813110 systemd[1]: Mounted dev-mqueue.mount. Dec 13 13:57:09.813121 systemd[1]: Mounted media.mount. Dec 13 13:57:09.813131 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 13:57:09.813142 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 13:57:09.813152 systemd[1]: Mounted tmp.mount. Dec 13 13:57:09.813163 systemd[1]: Finished kmod-static-nodes.service. Dec 13 13:57:09.813174 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 13:57:09.813185 systemd[1]: Finished modprobe@configfs.service. Dec 13 13:57:09.813195 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 13:57:09.813208 systemd-journald[1012]: Journal started Dec 13 13:57:09.813258 systemd-journald[1012]: Runtime Journal (/run/log/journal/46eb39328a3b48ce98eae9c6137d4749) is 6.0M, max 48.7M, 42.6M free. Dec 13 13:57:07.882000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 13:57:07.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 13:57:07.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 13:57:07.966000 audit: BPF prog-id=10 op=LOAD Dec 13 13:57:07.966000 audit: BPF prog-id=10 op=UNLOAD Dec 13 13:57:07.966000 audit: BPF prog-id=11 op=LOAD Dec 13 13:57:07.966000 audit: BPF prog-id=11 op=UNLOAD Dec 13 13:57:08.000000 audit[935]: AVC avc: denied { associate } for pid=935 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 13:57:08.000000 audit[935]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001558ac a1=40000d8de0 a2=40000df0c0 a3=32 items=0 ppid=918 pid=935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:08.000000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 13:57:08.002000 audit[935]: AVC avc: denied { associate } for pid=935 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 13:57:08.002000 audit[935]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000155985 a2=1ed a3=0 items=2 ppid=918 pid=935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:08.002000 audit: CWD cwd="/" Dec 13 13:57:08.002000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:57:08.002000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:57:08.002000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 13:57:09.674000 audit: BPF prog-id=12 op=LOAD Dec 13 13:57:09.674000 audit: BPF prog-id=3 op=UNLOAD Dec 13 13:57:09.674000 audit: BPF prog-id=13 op=LOAD Dec 13 13:57:09.674000 audit: BPF prog-id=14 op=LOAD Dec 13 13:57:09.675000 audit: BPF prog-id=4 op=UNLOAD Dec 13 13:57:09.675000 audit: BPF prog-id=5 op=UNLOAD Dec 13 13:57:09.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.685000 audit: BPF prog-id=12 op=UNLOAD Dec 13 13:57:09.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.777000 audit: BPF prog-id=15 op=LOAD Dec 13 13:57:09.778000 audit: BPF prog-id=16 op=LOAD Dec 13 13:57:09.780000 audit: BPF prog-id=17 op=LOAD Dec 13 13:57:09.780000 audit: BPF prog-id=13 op=UNLOAD Dec 13 13:57:09.780000 audit: BPF prog-id=14 op=UNLOAD Dec 13 13:57:09.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.806000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 13:57:09.806000 audit[1012]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffe986e7c0 a2=4000 a3=1 items=0 ppid=1 pid=1012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:09.806000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 13:57:09.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:07.999966 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 13:57:09.673500 systemd[1]: Queued start job for default target multi-user.target. Dec 13 13:57:08.000226 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:08Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 13:57:09.673513 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 13:57:08.000244 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:08Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 13:57:09.676078 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 13:57:08.000271 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:08Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 13:57:09.814736 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 13:57:08.000281 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:08Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 13:57:08.000307 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:08Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 13:57:08.000319 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:08Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 13:57:08.000522 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:08Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 13:57:08.000556 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:08Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 13:57:08.000567 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:08Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 13:57:08.000963 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:08Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 13:57:08.000995 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:08Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 13:57:08.001012 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:08Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 13:57:08.001034 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:08Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 13:57:08.001052 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:08Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 13:57:09.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:08.001065 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:08Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 13:57:09.428436 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:09Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 13:57:09.428701 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:09Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 13:57:09.428800 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:09Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 13:57:09.428959 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:09Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 13:57:09.429006 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:09Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 13:57:09.429083 /usr/lib/systemd/system-generators/torcx-generator[935]: time="2024-12-13T13:57:09Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 13:57:09.816995 systemd[1]: Started systemd-journald.service. Dec 13 13:57:09.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.817884 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 13:57:09.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.818973 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 13:57:09.819146 systemd[1]: Finished modprobe@drm.service. Dec 13 13:57:09.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.820169 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 13:57:09.820328 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 13:57:09.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.821464 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 13:57:09.821591 systemd[1]: Finished modprobe@fuse.service. Dec 13 13:57:09.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.822597 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 13:57:09.822755 systemd[1]: Finished modprobe@loop.service. Dec 13 13:57:09.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.823826 systemd[1]: Finished systemd-modules-load.service. Dec 13 13:57:09.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.825065 systemd[1]: Finished systemd-network-generator.service. Dec 13 13:57:09.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.826297 systemd[1]: Finished systemd-remount-fs.service. Dec 13 13:57:09.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.827645 systemd[1]: Reached target network-pre.target. Dec 13 13:57:09.829649 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 13:57:09.831462 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 13:57:09.832207 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 13:57:09.835018 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 13:57:09.837181 systemd[1]: Starting systemd-journal-flush.service... Dec 13 13:57:09.838179 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 13:57:09.839229 systemd[1]: Starting systemd-random-seed.service... Dec 13 13:57:09.840216 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 13:57:09.841275 systemd[1]: Starting systemd-sysctl.service... Dec 13 13:57:09.846603 systemd[1]: Starting systemd-sysusers.service... Dec 13 13:57:09.851001 systemd-journald[1012]: Time spent on flushing to /var/log/journal/46eb39328a3b48ce98eae9c6137d4749 is 15.180ms for 992 entries. Dec 13 13:57:09.851001 systemd-journald[1012]: System Journal (/var/log/journal/46eb39328a3b48ce98eae9c6137d4749) is 8.0M, max 195.6M, 187.6M free. Dec 13 13:57:09.873744 systemd-journald[1012]: Received client request to flush runtime journal. Dec 13 13:57:09.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.853192 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 13:57:09.876493 udevadm[1036]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 13:57:09.854570 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 13:57:09.855897 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 13:57:09.858222 systemd[1]: Starting systemd-udev-settle.service... Dec 13 13:57:09.859334 systemd[1]: Finished systemd-random-seed.service. Dec 13 13:57:09.860500 systemd[1]: Reached target first-boot-complete.target. Dec 13 13:57:09.865786 systemd[1]: Finished systemd-sysctl.service. Dec 13 13:57:09.871439 systemd[1]: Finished systemd-sysusers.service. Dec 13 13:57:09.873409 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 13:57:09.876343 systemd[1]: Finished systemd-journal-flush.service. Dec 13 13:57:09.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:09.890677 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 13:57:09.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.299845 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 13:57:10.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.300000 audit: BPF prog-id=18 op=LOAD Dec 13 13:57:10.300000 audit: BPF prog-id=19 op=LOAD Dec 13 13:57:10.300000 audit: BPF prog-id=7 op=UNLOAD Dec 13 13:57:10.301000 audit: BPF prog-id=8 op=UNLOAD Dec 13 13:57:10.302111 systemd[1]: Starting systemd-udevd.service... Dec 13 13:57:10.320898 systemd-udevd[1040]: Using default interface naming scheme 'v252'. Dec 13 13:57:10.332248 systemd[1]: Started systemd-udevd.service. Dec 13 13:57:10.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.333000 audit: BPF prog-id=20 op=LOAD Dec 13 13:57:10.337542 systemd[1]: Starting systemd-networkd.service... Dec 13 13:57:10.340000 audit: BPF prog-id=21 op=LOAD Dec 13 13:57:10.340000 audit: BPF prog-id=22 op=LOAD Dec 13 13:57:10.340000 audit: BPF prog-id=23 op=LOAD Dec 13 13:57:10.341848 systemd[1]: Starting systemd-userdbd.service... Dec 13 13:57:10.354045 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Dec 13 13:57:10.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.374630 systemd[1]: Started systemd-userdbd.service. Dec 13 13:57:10.387165 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 13:57:10.435332 systemd-networkd[1055]: lo: Link UP Dec 13 13:57:10.435611 systemd-networkd[1055]: lo: Gained carrier Dec 13 13:57:10.436034 systemd-networkd[1055]: Enumeration completed Dec 13 13:57:10.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.436213 systemd[1]: Started systemd-networkd.service. Dec 13 13:57:10.437706 systemd-networkd[1055]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 13:57:10.442420 systemd-networkd[1055]: eth0: Link UP Dec 13 13:57:10.442710 systemd-networkd[1055]: eth0: Gained carrier Dec 13 13:57:10.447886 systemd[1]: Finished systemd-udev-settle.service. Dec 13 13:57:10.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.449926 systemd[1]: Starting lvm2-activation-early.service... Dec 13 13:57:10.461806 lvm[1073]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 13:57:10.467563 systemd-networkd[1055]: eth0: DHCPv4 address 10.0.0.25/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 13:57:10.488210 systemd[1]: Finished lvm2-activation-early.service. Dec 13 13:57:10.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.489241 systemd[1]: Reached target cryptsetup.target. Dec 13 13:57:10.491149 systemd[1]: Starting lvm2-activation.service... Dec 13 13:57:10.494628 lvm[1074]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 13:57:10.517176 systemd[1]: Finished lvm2-activation.service. Dec 13 13:57:10.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.518135 systemd[1]: Reached target local-fs-pre.target. Dec 13 13:57:10.518996 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 13:57:10.519035 systemd[1]: Reached target local-fs.target. Dec 13 13:57:10.519854 systemd[1]: Reached target machines.target. Dec 13 13:57:10.521731 systemd[1]: Starting ldconfig.service... Dec 13 13:57:10.522759 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 13:57:10.522813 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:57:10.523808 systemd[1]: Starting systemd-boot-update.service... Dec 13 13:57:10.525717 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 13:57:10.527669 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 13:57:10.529614 systemd[1]: Starting systemd-sysext.service... Dec 13 13:57:10.531319 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1076 (bootctl) Dec 13 13:57:10.532368 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 13:57:10.538969 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 13:57:10.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.544707 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 13:57:10.550915 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 13:57:10.551105 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 13:57:10.601664 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 13:57:10.603517 kernel: loop0: detected capacity change from 0 to 194512 Dec 13 13:57:10.605195 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 13:57:10.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.614486 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 13:57:10.623863 systemd-fsck[1084]: fsck.fat 4.2 (2021-01-31) Dec 13 13:57:10.623863 systemd-fsck[1084]: /dev/vda1: 236 files, 117175/258078 clusters Dec 13 13:57:10.626510 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 13:57:10.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.628470 kernel: loop1: detected capacity change from 0 to 194512 Dec 13 13:57:10.628718 systemd[1]: Mounting boot.mount... Dec 13 13:57:10.634081 (sd-sysext)[1089]: Using extensions 'kubernetes'. Dec 13 13:57:10.634544 (sd-sysext)[1089]: Merged extensions into '/usr'. Dec 13 13:57:10.643469 systemd[1]: Mounted boot.mount. Dec 13 13:57:10.654575 systemd[1]: Finished systemd-boot-update.service. Dec 13 13:57:10.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.656178 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 13:57:10.658295 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 13:57:10.660177 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 13:57:10.663032 systemd[1]: Starting modprobe@loop.service... Dec 13 13:57:10.664091 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 13:57:10.664222 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:57:10.665960 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 13:57:10.666107 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 13:57:10.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.667246 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 13:57:10.667365 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 13:57:10.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.668775 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 13:57:10.668877 systemd[1]: Finished modprobe@loop.service. Dec 13 13:57:10.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.670591 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 13:57:10.670925 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 13:57:10.726184 ldconfig[1075]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 13:57:10.730464 systemd[1]: Finished ldconfig.service. Dec 13 13:57:10.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.799802 systemd[1]: Mounting usr-share-oem.mount... Dec 13 13:57:10.804697 systemd[1]: Mounted usr-share-oem.mount. Dec 13 13:57:10.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.806392 systemd[1]: Finished systemd-sysext.service. Dec 13 13:57:10.808222 systemd[1]: Starting ensure-sysext.service... Dec 13 13:57:10.809867 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 13:57:10.813804 systemd[1]: Reloading. Dec 13 13:57:10.819820 systemd-tmpfiles[1097]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 13:57:10.820823 systemd-tmpfiles[1097]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 13:57:10.822277 systemd-tmpfiles[1097]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 13:57:10.856133 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2024-12-13T13:57:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 13:57:10.856161 /usr/lib/systemd/system-generators/torcx-generator[1117]: time="2024-12-13T13:57:10Z" level=info msg="torcx already run" Dec 13 13:57:10.926062 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 13:57:10.926081 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 13:57:10.941217 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 13:57:10.981000 audit: BPF prog-id=24 op=LOAD Dec 13 13:57:10.981000 audit: BPF prog-id=21 op=UNLOAD Dec 13 13:57:10.981000 audit: BPF prog-id=25 op=LOAD Dec 13 13:57:10.981000 audit: BPF prog-id=26 op=LOAD Dec 13 13:57:10.981000 audit: BPF prog-id=22 op=UNLOAD Dec 13 13:57:10.981000 audit: BPF prog-id=23 op=UNLOAD Dec 13 13:57:10.981000 audit: BPF prog-id=27 op=LOAD Dec 13 13:57:10.981000 audit: BPF prog-id=20 op=UNLOAD Dec 13 13:57:10.983000 audit: BPF prog-id=28 op=LOAD Dec 13 13:57:10.983000 audit: BPF prog-id=15 op=UNLOAD Dec 13 13:57:10.983000 audit: BPF prog-id=29 op=LOAD Dec 13 13:57:10.983000 audit: BPF prog-id=30 op=LOAD Dec 13 13:57:10.983000 audit: BPF prog-id=16 op=UNLOAD Dec 13 13:57:10.983000 audit: BPF prog-id=17 op=UNLOAD Dec 13 13:57:10.984000 audit: BPF prog-id=31 op=LOAD Dec 13 13:57:10.984000 audit: BPF prog-id=32 op=LOAD Dec 13 13:57:10.984000 audit: BPF prog-id=18 op=UNLOAD Dec 13 13:57:10.984000 audit: BPF prog-id=19 op=UNLOAD Dec 13 13:57:10.986925 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 13:57:10.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:10.991045 systemd[1]: Starting audit-rules.service... Dec 13 13:57:10.992935 systemd[1]: Starting clean-ca-certificates.service... Dec 13 13:57:10.995892 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 13:57:11.000000 audit: BPF prog-id=33 op=LOAD Dec 13 13:57:11.001610 systemd[1]: Starting systemd-resolved.service... Dec 13 13:57:11.003000 audit: BPF prog-id=34 op=LOAD Dec 13 13:57:11.004542 systemd[1]: Starting systemd-timesyncd.service... Dec 13 13:57:11.006959 systemd[1]: Starting systemd-update-utmp.service... Dec 13 13:57:11.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:11.008654 systemd[1]: Finished clean-ca-certificates.service. Dec 13 13:57:11.013148 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 13:57:11.013000 audit[1167]: SYSTEM_BOOT pid=1167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 13:57:11.014714 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 13:57:11.016542 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 13:57:11.018325 systemd[1]: Starting modprobe@loop.service... Dec 13 13:57:11.019061 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 13:57:11.019189 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:57:11.019300 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 13:57:11.020176 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 13:57:11.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:11.021573 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 13:57:11.021687 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 13:57:11.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:11.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:11.022872 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 13:57:11.022980 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 13:57:11.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:11.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:11.024200 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 13:57:11.024352 systemd[1]: Finished modprobe@loop.service. Dec 13 13:57:11.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:11.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:11.027401 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 13:57:11.027735 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 13:57:11.029108 systemd[1]: Starting systemd-update-done.service... Dec 13 13:57:11.032217 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 13:57:11.033380 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 13:57:11.035287 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 13:57:11.037166 systemd[1]: Starting modprobe@loop.service... Dec 13 13:57:11.038070 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 13:57:11.038183 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:57:11.038281 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 13:57:11.039258 systemd[1]: Finished systemd-update-utmp.service. Dec 13 13:57:11.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:11.040520 systemd[1]: Finished systemd-update-done.service. Dec 13 13:57:11.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:11.041906 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 13:57:11.042035 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 13:57:11.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:11.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:11.043215 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 13:57:11.043316 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 13:57:11.044000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 13:57:11.044000 audit[1183]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc2e09030 a2=420 a3=0 items=0 ppid=1156 pid=1183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:11.044000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 13:57:11.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:11.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:11.044638 augenrules[1183]: No rules Dec 13 13:57:11.044828 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 13:57:11.044939 systemd[1]: Finished modprobe@loop.service. Dec 13 13:57:11.046298 systemd[1]: Finished audit-rules.service. Dec 13 13:57:11.050132 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 13:57:11.051297 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 13:57:11.053486 systemd[1]: Starting modprobe@drm.service... Dec 13 13:57:11.055704 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 13:57:11.057757 systemd[1]: Starting modprobe@loop.service... Dec 13 13:57:11.058648 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 13:57:11.058770 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:57:11.060228 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 13:57:11.061260 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 13:57:11.062435 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 13:57:11.062637 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 13:57:11.063781 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 13:57:11.063890 systemd[1]: Finished modprobe@drm.service. Dec 13 13:57:11.065106 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 13:57:11.065208 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 13:57:11.066560 systemd-timesyncd[1166]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 13:57:11.066658 systemd[1]: Started systemd-timesyncd.service. Dec 13 13:57:11.066660 systemd-timesyncd[1166]: Initial clock synchronization to Fri 2024-12-13 13:57:11.337254 UTC. Dec 13 13:57:11.067610 systemd-resolved[1160]: Positive Trust Anchors: Dec 13 13:57:11.067805 systemd-resolved[1160]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 13:57:11.067882 systemd-resolved[1160]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 13:57:11.068084 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 13:57:11.068191 systemd[1]: Finished modprobe@loop.service. Dec 13 13:57:11.069878 systemd[1]: Reached target time-set.target. Dec 13 13:57:11.070854 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 13:57:11.070922 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 13:57:11.071252 systemd[1]: Finished ensure-sysext.service. Dec 13 13:57:11.077773 systemd-resolved[1160]: Defaulting to hostname 'linux'. Dec 13 13:57:11.079282 systemd[1]: Started systemd-resolved.service. Dec 13 13:57:11.080038 systemd[1]: Reached target network.target. Dec 13 13:57:11.080769 systemd[1]: Reached target nss-lookup.target. Dec 13 13:57:11.081541 systemd[1]: Reached target sysinit.target. Dec 13 13:57:11.082358 systemd[1]: Started motdgen.path. Dec 13 13:57:11.083146 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 13:57:11.084402 systemd[1]: Started logrotate.timer. Dec 13 13:57:11.085127 systemd[1]: Started mdadm.timer. Dec 13 13:57:11.085723 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 13:57:11.086499 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 13:57:11.086532 systemd[1]: Reached target paths.target. Dec 13 13:57:11.087244 systemd[1]: Reached target timers.target. Dec 13 13:57:11.088281 systemd[1]: Listening on dbus.socket. Dec 13 13:57:11.089943 systemd[1]: Starting docker.socket... Dec 13 13:57:11.092950 systemd[1]: Listening on sshd.socket. Dec 13 13:57:11.093761 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:57:11.094168 systemd[1]: Listening on docker.socket. Dec 13 13:57:11.094960 systemd[1]: Reached target sockets.target. Dec 13 13:57:11.095726 systemd[1]: Reached target basic.target. Dec 13 13:57:11.096498 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 13:57:11.096528 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 13:57:11.097428 systemd[1]: Starting containerd.service... Dec 13 13:57:11.099239 systemd[1]: Starting dbus.service... Dec 13 13:57:11.100967 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 13:57:11.103041 systemd[1]: Starting extend-filesystems.service... Dec 13 13:57:11.103937 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 13:57:11.105279 systemd[1]: Starting motdgen.service... Dec 13 13:57:11.107292 systemd[1]: Starting prepare-helm.service... Dec 13 13:57:11.109315 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 13:57:11.111623 systemd[1]: Starting sshd-keygen.service... Dec 13 13:57:11.116067 systemd[1]: Starting systemd-logind.service... Dec 13 13:57:11.116554 jq[1198]: false Dec 13 13:57:11.116887 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:57:11.116957 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 13:57:11.117383 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 13:57:11.118126 systemd[1]: Starting update-engine.service... Dec 13 13:57:11.119967 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 13:57:11.124970 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 13:57:11.125180 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 13:57:11.126324 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 13:57:11.127024 jq[1212]: true Dec 13 13:57:11.128875 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 13:57:11.138940 tar[1219]: linux-arm64/helm Dec 13 13:57:11.139514 jq[1220]: true Dec 13 13:57:11.140386 extend-filesystems[1199]: Found loop1 Dec 13 13:57:11.141397 extend-filesystems[1199]: Found vda Dec 13 13:57:11.141397 extend-filesystems[1199]: Found vda1 Dec 13 13:57:11.141397 extend-filesystems[1199]: Found vda2 Dec 13 13:57:11.141397 extend-filesystems[1199]: Found vda3 Dec 13 13:57:11.141397 extend-filesystems[1199]: Found usr Dec 13 13:57:11.141397 extend-filesystems[1199]: Found vda4 Dec 13 13:57:11.141397 extend-filesystems[1199]: Found vda6 Dec 13 13:57:11.141397 extend-filesystems[1199]: Found vda7 Dec 13 13:57:11.141397 extend-filesystems[1199]: Found vda9 Dec 13 13:57:11.141397 extend-filesystems[1199]: Checking size of /dev/vda9 Dec 13 13:57:11.151384 dbus-daemon[1197]: [system] SELinux support is enabled Dec 13 13:57:11.149696 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 13:57:11.149879 systemd[1]: Finished motdgen.service. Dec 13 13:57:11.151684 systemd[1]: Started dbus.service. Dec 13 13:57:11.155123 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 13:57:11.155149 systemd[1]: Reached target system-config.target. Dec 13 13:57:11.156166 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 13:57:11.156186 systemd[1]: Reached target user-config.target. Dec 13 13:57:11.167505 extend-filesystems[1199]: Resized partition /dev/vda9 Dec 13 13:57:11.169706 extend-filesystems[1242]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 13:57:11.176240 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 13:57:11.191361 systemd-logind[1210]: Watching system buttons on /dev/input/event0 (Power Button) Dec 13 13:57:11.192491 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 13:57:11.192692 systemd-logind[1210]: New seat seat0. Dec 13 13:57:11.195100 systemd[1]: Started systemd-logind.service. Dec 13 13:57:11.206438 extend-filesystems[1242]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 13:57:11.206438 extend-filesystems[1242]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 13:57:11.206438 extend-filesystems[1242]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 13:57:11.210761 extend-filesystems[1199]: Resized filesystem in /dev/vda9 Dec 13 13:57:11.206516 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 13:57:11.206674 systemd[1]: Finished extend-filesystems.service. Dec 13 13:57:11.213351 bash[1239]: Updated "/home/core/.ssh/authorized_keys" Dec 13 13:57:11.218093 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 13:57:11.244549 update_engine[1211]: I1213 13:57:11.242516 1211 main.cc:92] Flatcar Update Engine starting Dec 13 13:57:11.249557 systemd[1]: Started update-engine.service. Dec 13 13:57:11.250084 env[1222]: time="2024-12-13T13:57:11.250041200Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 13:57:11.250975 update_engine[1211]: I1213 13:57:11.250949 1211 update_check_scheduler.cc:74] Next update check in 4m17s Dec 13 13:57:11.255220 systemd[1]: Started locksmithd.service. Dec 13 13:57:11.274627 env[1222]: time="2024-12-13T13:57:11.272790040Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 13:57:11.274627 env[1222]: time="2024-12-13T13:57:11.272928520Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 13:57:11.276941 env[1222]: time="2024-12-13T13:57:11.275533640Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 13:57:11.276941 env[1222]: time="2024-12-13T13:57:11.275566240Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 13:57:11.276941 env[1222]: time="2024-12-13T13:57:11.275759000Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 13:57:11.276941 env[1222]: time="2024-12-13T13:57:11.275776360Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 13:57:11.276941 env[1222]: time="2024-12-13T13:57:11.275789560Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 13:57:11.276941 env[1222]: time="2024-12-13T13:57:11.275799800Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 13:57:11.276941 env[1222]: time="2024-12-13T13:57:11.275874080Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 13:57:11.276941 env[1222]: time="2024-12-13T13:57:11.276202280Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 13:57:11.276941 env[1222]: time="2024-12-13T13:57:11.276321520Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 13:57:11.276941 env[1222]: time="2024-12-13T13:57:11.276337640Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 13:57:11.277508 env[1222]: time="2024-12-13T13:57:11.276402000Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 13:57:11.277508 env[1222]: time="2024-12-13T13:57:11.276413760Z" level=info msg="metadata content store policy set" policy=shared Dec 13 13:57:11.280608 env[1222]: time="2024-12-13T13:57:11.280577080Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 13:57:11.280608 env[1222]: time="2024-12-13T13:57:11.280608440Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 13:57:11.280775 env[1222]: time="2024-12-13T13:57:11.280621920Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 13:57:11.280775 env[1222]: time="2024-12-13T13:57:11.280671400Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 13:57:11.280775 env[1222]: time="2024-12-13T13:57:11.280689240Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 13:57:11.280775 env[1222]: time="2024-12-13T13:57:11.280707880Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 13:57:11.280775 env[1222]: time="2024-12-13T13:57:11.280721680Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 13:57:11.281169 env[1222]: time="2024-12-13T13:57:11.281092560Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 13:57:11.281169 env[1222]: time="2024-12-13T13:57:11.281122440Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 13:57:11.281169 env[1222]: time="2024-12-13T13:57:11.281135000Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 13:57:11.281169 env[1222]: time="2024-12-13T13:57:11.281147160Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 13:57:11.281169 env[1222]: time="2024-12-13T13:57:11.281159320Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 13:57:11.281285 env[1222]: time="2024-12-13T13:57:11.281266840Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 13:57:11.281379 env[1222]: time="2024-12-13T13:57:11.281336880Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 13:57:11.281676 env[1222]: time="2024-12-13T13:57:11.281595520Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 13:57:11.281676 env[1222]: time="2024-12-13T13:57:11.281627720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 13:57:11.281676 env[1222]: time="2024-12-13T13:57:11.281642440Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 13:57:11.281765 env[1222]: time="2024-12-13T13:57:11.281748360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 13:57:11.281795 env[1222]: time="2024-12-13T13:57:11.281765360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 13:57:11.281795 env[1222]: time="2024-12-13T13:57:11.281778920Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 13:57:11.281795 env[1222]: time="2024-12-13T13:57:11.281790800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 13:57:11.281864 env[1222]: time="2024-12-13T13:57:11.281802240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 13:57:11.281864 env[1222]: time="2024-12-13T13:57:11.281814600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 13:57:11.281864 env[1222]: time="2024-12-13T13:57:11.281825600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 13:57:11.281864 env[1222]: time="2024-12-13T13:57:11.281836480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 13:57:11.281864 env[1222]: time="2024-12-13T13:57:11.281849360Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 13:57:11.282043 env[1222]: time="2024-12-13T13:57:11.281966520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 13:57:11.282043 env[1222]: time="2024-12-13T13:57:11.281988360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 13:57:11.282043 env[1222]: time="2024-12-13T13:57:11.282000360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 13:57:11.282043 env[1222]: time="2024-12-13T13:57:11.282025520Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 13:57:11.282043 env[1222]: time="2024-12-13T13:57:11.282041720Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 13:57:11.282147 env[1222]: time="2024-12-13T13:57:11.282052600Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 13:57:11.282147 env[1222]: time="2024-12-13T13:57:11.282069800Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 13:57:11.282147 env[1222]: time="2024-12-13T13:57:11.282101360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 13:57:11.282615 env[1222]: time="2024-12-13T13:57:11.282440600Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 13:57:11.282615 env[1222]: time="2024-12-13T13:57:11.282540760Z" level=info msg="Connect containerd service" Dec 13 13:57:11.282615 env[1222]: time="2024-12-13T13:57:11.282580480Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 13:57:11.285343 env[1222]: time="2024-12-13T13:57:11.283278880Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 13:57:11.285343 env[1222]: time="2024-12-13T13:57:11.283624280Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 13:57:11.285343 env[1222]: time="2024-12-13T13:57:11.283663120Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 13:57:11.285343 env[1222]: time="2024-12-13T13:57:11.285047200Z" level=info msg="containerd successfully booted in 0.035747s" Dec 13 13:57:11.283763 systemd[1]: Started containerd.service. Dec 13 13:57:11.287718 env[1222]: time="2024-12-13T13:57:11.287645800Z" level=info msg="Start subscribing containerd event" Dec 13 13:57:11.287842 env[1222]: time="2024-12-13T13:57:11.287805320Z" level=info msg="Start recovering state" Dec 13 13:57:11.289281 env[1222]: time="2024-12-13T13:57:11.287880880Z" level=info msg="Start event monitor" Dec 13 13:57:11.289281 env[1222]: time="2024-12-13T13:57:11.287902520Z" level=info msg="Start snapshots syncer" Dec 13 13:57:11.289281 env[1222]: time="2024-12-13T13:57:11.287916680Z" level=info msg="Start cni network conf syncer for default" Dec 13 13:57:11.289281 env[1222]: time="2024-12-13T13:57:11.287925840Z" level=info msg="Start streaming server" Dec 13 13:57:11.314659 locksmithd[1252]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 13:57:11.531656 tar[1219]: linux-arm64/LICENSE Dec 13 13:57:11.531774 tar[1219]: linux-arm64/README.md Dec 13 13:57:11.535803 systemd[1]: Finished prepare-helm.service. Dec 13 13:57:11.541590 systemd-networkd[1055]: eth0: Gained IPv6LL Dec 13 13:57:11.543108 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 13:57:11.544361 systemd[1]: Reached target network-online.target. Dec 13 13:57:11.546660 systemd[1]: Starting kubelet.service... Dec 13 13:57:12.050575 systemd[1]: Started kubelet.service. Dec 13 13:57:12.290723 sshd_keygen[1217]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 13:57:12.309445 systemd[1]: Finished sshd-keygen.service. Dec 13 13:57:12.311947 systemd[1]: Starting issuegen.service... Dec 13 13:57:12.316692 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 13:57:12.316889 systemd[1]: Finished issuegen.service. Dec 13 13:57:12.319135 systemd[1]: Starting systemd-user-sessions.service... Dec 13 13:57:12.325601 systemd[1]: Finished systemd-user-sessions.service. Dec 13 13:57:12.327912 systemd[1]: Started getty@tty1.service. Dec 13 13:57:12.330212 systemd[1]: Started serial-getty@ttyAMA0.service. Dec 13 13:57:12.331352 systemd[1]: Reached target getty.target. Dec 13 13:57:12.332291 systemd[1]: Reached target multi-user.target. Dec 13 13:57:12.334561 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 13:57:12.342095 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 13:57:12.342285 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 13:57:12.343494 systemd[1]: Startup finished in 596ms (kernel) + 5.274s (initrd) + 4.497s (userspace) = 10.369s. Dec 13 13:57:12.570905 kubelet[1266]: E1213 13:57:12.570761 1266 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 13:57:12.573029 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 13:57:12.573158 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 13:57:15.757500 systemd[1]: Created slice system-sshd.slice. Dec 13 13:57:15.758618 systemd[1]: Started sshd@0-10.0.0.25:22-10.0.0.1:60416.service. Dec 13 13:57:15.800261 sshd[1289]: Accepted publickey for core from 10.0.0.1 port 60416 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:57:15.804439 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:57:15.817351 systemd-logind[1210]: New session 1 of user core. Dec 13 13:57:15.818262 systemd[1]: Created slice user-500.slice. Dec 13 13:57:15.819301 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 13:57:15.827604 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 13:57:15.828858 systemd[1]: Starting user@500.service... Dec 13 13:57:15.831450 (systemd)[1292]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:57:15.888710 systemd[1292]: Queued start job for default target default.target. Dec 13 13:57:15.889133 systemd[1292]: Reached target paths.target. Dec 13 13:57:15.889153 systemd[1292]: Reached target sockets.target. Dec 13 13:57:15.889164 systemd[1292]: Reached target timers.target. Dec 13 13:57:15.889175 systemd[1292]: Reached target basic.target. Dec 13 13:57:15.889223 systemd[1292]: Reached target default.target. Dec 13 13:57:15.889247 systemd[1292]: Startup finished in 52ms. Dec 13 13:57:15.889442 systemd[1]: Started user@500.service. Dec 13 13:57:15.890895 systemd[1]: Started session-1.scope. Dec 13 13:57:15.943452 systemd[1]: Started sshd@1-10.0.0.25:22-10.0.0.1:60432.service. Dec 13 13:57:15.978173 sshd[1301]: Accepted publickey for core from 10.0.0.1 port 60432 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:57:15.979658 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:57:15.985352 systemd[1]: Started session-2.scope. Dec 13 13:57:15.985633 systemd-logind[1210]: New session 2 of user core. Dec 13 13:57:16.041180 sshd[1301]: pam_unix(sshd:session): session closed for user core Dec 13 13:57:16.044080 systemd[1]: Started sshd@2-10.0.0.25:22-10.0.0.1:60436.service. Dec 13 13:57:16.045453 systemd-logind[1210]: Session 2 logged out. Waiting for processes to exit. Dec 13 13:57:16.045649 systemd[1]: sshd@1-10.0.0.25:22-10.0.0.1:60432.service: Deactivated successfully. Dec 13 13:57:16.046250 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 13:57:16.046892 systemd-logind[1210]: Removed session 2. Dec 13 13:57:16.078936 sshd[1306]: Accepted publickey for core from 10.0.0.1 port 60436 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:57:16.080001 sshd[1306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:57:16.083056 systemd-logind[1210]: New session 3 of user core. Dec 13 13:57:16.083815 systemd[1]: Started session-3.scope. Dec 13 13:57:16.133179 sshd[1306]: pam_unix(sshd:session): session closed for user core Dec 13 13:57:16.136035 systemd[1]: sshd@2-10.0.0.25:22-10.0.0.1:60436.service: Deactivated successfully. Dec 13 13:57:16.136568 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 13:57:16.137062 systemd-logind[1210]: Session 3 logged out. Waiting for processes to exit. Dec 13 13:57:16.138003 systemd[1]: Started sshd@3-10.0.0.25:22-10.0.0.1:60444.service. Dec 13 13:57:16.138655 systemd-logind[1210]: Removed session 3. Dec 13 13:57:16.172612 sshd[1313]: Accepted publickey for core from 10.0.0.1 port 60444 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:57:16.173684 sshd[1313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:57:16.176871 systemd-logind[1210]: New session 4 of user core. Dec 13 13:57:16.177599 systemd[1]: Started session-4.scope. Dec 13 13:57:16.231716 sshd[1313]: pam_unix(sshd:session): session closed for user core Dec 13 13:57:16.234904 systemd[1]: Started sshd@4-10.0.0.25:22-10.0.0.1:60452.service. Dec 13 13:57:16.235393 systemd[1]: sshd@3-10.0.0.25:22-10.0.0.1:60444.service: Deactivated successfully. Dec 13 13:57:16.235986 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 13:57:16.236397 systemd-logind[1210]: Session 4 logged out. Waiting for processes to exit. Dec 13 13:57:16.237001 systemd-logind[1210]: Removed session 4. Dec 13 13:57:16.269933 sshd[1318]: Accepted publickey for core from 10.0.0.1 port 60452 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:57:16.271015 sshd[1318]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:57:16.273999 systemd-logind[1210]: New session 5 of user core. Dec 13 13:57:16.274757 systemd[1]: Started session-5.scope. Dec 13 13:57:16.332293 sudo[1322]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 13:57:16.332567 sudo[1322]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 13:57:16.346672 dbus-daemon[1197]: avc: received setenforce notice (enforcing=1) Dec 13 13:57:16.348409 sudo[1322]: pam_unix(sudo:session): session closed for user root Dec 13 13:57:16.350326 sshd[1318]: pam_unix(sshd:session): session closed for user core Dec 13 13:57:16.353081 systemd[1]: sshd@4-10.0.0.25:22-10.0.0.1:60452.service: Deactivated successfully. Dec 13 13:57:16.353669 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 13:57:16.354195 systemd-logind[1210]: Session 5 logged out. Waiting for processes to exit. Dec 13 13:57:16.355356 systemd[1]: Started sshd@5-10.0.0.25:22-10.0.0.1:60456.service. Dec 13 13:57:16.355947 systemd-logind[1210]: Removed session 5. Dec 13 13:57:16.390200 sshd[1326]: Accepted publickey for core from 10.0.0.1 port 60456 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:57:16.391315 sshd[1326]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:57:16.395149 systemd[1]: Started session-6.scope. Dec 13 13:57:16.395409 systemd-logind[1210]: New session 6 of user core. Dec 13 13:57:16.449041 sudo[1330]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 13:57:16.449517 sudo[1330]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 13:57:16.452189 sudo[1330]: pam_unix(sudo:session): session closed for user root Dec 13 13:57:16.456489 sudo[1329]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 13:57:16.456709 sudo[1329]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 13:57:16.464644 systemd[1]: Stopping audit-rules.service... Dec 13 13:57:16.465000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 13:57:16.466755 auditctl[1333]: No rules Dec 13 13:57:16.466957 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 13:57:16.467123 systemd[1]: Stopped audit-rules.service. Dec 13 13:57:16.468019 kernel: kauditd_printk_skb: 161 callbacks suppressed Dec 13 13:57:16.468071 kernel: audit: type=1305 audit(1734098236.465:194): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 13:57:16.468087 kernel: audit: type=1300 audit(1734098236.465:194): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc36b8210 a2=420 a3=0 items=0 ppid=1 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:16.465000 audit[1333]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc36b8210 a2=420 a3=0 items=0 ppid=1 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:16.468591 systemd[1]: Starting audit-rules.service... Dec 13 13:57:16.465000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 13:57:16.472626 kernel: audit: type=1327 audit(1734098236.465:194): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 13:57:16.472674 kernel: audit: type=1131 audit(1734098236.466:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:16.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:16.484319 augenrules[1350]: No rules Dec 13 13:57:16.484924 systemd[1]: Finished audit-rules.service. Dec 13 13:57:16.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:16.486183 sudo[1329]: pam_unix(sudo:session): session closed for user root Dec 13 13:57:16.484000 audit[1329]: USER_END pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:57:16.488377 sshd[1326]: pam_unix(sshd:session): session closed for user core Dec 13 13:57:16.490844 systemd[1]: Started sshd@6-10.0.0.25:22-10.0.0.1:60458.service. Dec 13 13:57:16.490939 kernel: audit: type=1130 audit(1734098236.483:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:16.490975 kernel: audit: type=1106 audit(1734098236.484:197): pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:57:16.490992 kernel: audit: type=1104 audit(1734098236.484:198): pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:57:16.484000 audit[1329]: CRED_DISP pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:57:16.491274 systemd[1]: sshd@5-10.0.0.25:22-10.0.0.1:60456.service: Deactivated successfully. Dec 13 13:57:16.492131 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 13:57:16.492610 systemd-logind[1210]: Session 6 logged out. Waiting for processes to exit. Dec 13 13:57:16.487000 audit[1326]: USER_END pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:57:16.493593 systemd-logind[1210]: Removed session 6. Dec 13 13:57:16.496981 kernel: audit: type=1106 audit(1734098236.487:199): pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:57:16.497030 kernel: audit: type=1104 audit(1734098236.487:200): pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:57:16.487000 audit[1326]: CRED_DISP pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:57:16.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.25:22-10.0.0.1:60458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:16.502501 kernel: audit: type=1130 audit(1734098236.489:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.25:22-10.0.0.1:60458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:16.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.25:22-10.0.0.1:60456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:16.527000 audit[1355]: USER_ACCT pid=1355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:57:16.527858 sshd[1355]: Accepted publickey for core from 10.0.0.1 port 60458 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:57:16.528000 audit[1355]: CRED_ACQ pid=1355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:57:16.528000 audit[1355]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcd225750 a2=3 a3=1 items=0 ppid=1 pid=1355 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:16.528000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:57:16.529145 sshd[1355]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:57:16.532233 systemd-logind[1210]: New session 7 of user core. Dec 13 13:57:16.532998 systemd[1]: Started session-7.scope. Dec 13 13:57:16.534000 audit[1355]: USER_START pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:57:16.535000 audit[1358]: CRED_ACQ pid=1358 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:57:16.582000 audit[1359]: USER_ACCT pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:57:16.584262 sudo[1359]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 13:57:16.584493 sudo[1359]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 13:57:16.582000 audit[1359]: CRED_REFR pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:57:16.585000 audit[1359]: USER_START pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:57:16.647950 systemd[1]: Starting docker.service... Dec 13 13:57:16.733023 env[1371]: time="2024-12-13T13:57:16.732973939Z" level=info msg="Starting up" Dec 13 13:57:16.734542 env[1371]: time="2024-12-13T13:57:16.734521493Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 13:57:16.734627 env[1371]: time="2024-12-13T13:57:16.734613197Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 13:57:16.734749 env[1371]: time="2024-12-13T13:57:16.734730806Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 13:57:16.734805 env[1371]: time="2024-12-13T13:57:16.734793465Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 13:57:16.737231 env[1371]: time="2024-12-13T13:57:16.737198341Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 13:57:16.737231 env[1371]: time="2024-12-13T13:57:16.737222736Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 13:57:16.737326 env[1371]: time="2024-12-13T13:57:16.737238686Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 13:57:16.737326 env[1371]: time="2024-12-13T13:57:16.737248966Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 13:57:16.859319 env[1371]: time="2024-12-13T13:57:16.859223699Z" level=info msg="Loading containers: start." Dec 13 13:57:16.904000 audit[1406]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:16.904000 audit[1406]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffe3971ef0 a2=0 a3=1 items=0 ppid=1371 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:16.904000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 13:57:16.906000 audit[1408]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:16.906000 audit[1408]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffff9c16f60 a2=0 a3=1 items=0 ppid=1371 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:16.906000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 13:57:16.908000 audit[1410]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:16.908000 audit[1410]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffffadb58f0 a2=0 a3=1 items=0 ppid=1371 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:16.908000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 13:57:16.909000 audit[1412]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:16.909000 audit[1412]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc16e97d0 a2=0 a3=1 items=0 ppid=1371 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:16.909000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 13:57:16.912000 audit[1414]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:16.912000 audit[1414]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcb94d6b0 a2=0 a3=1 items=0 ppid=1371 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:16.912000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 13:57:16.940000 audit[1419]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:16.940000 audit[1419]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcc92aaf0 a2=0 a3=1 items=0 ppid=1371 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:16.940000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 13:57:16.946000 audit[1421]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:16.946000 audit[1421]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffcd154860 a2=0 a3=1 items=0 ppid=1371 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:16.946000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 13:57:16.947000 audit[1423]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:16.947000 audit[1423]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffd6ea7510 a2=0 a3=1 items=0 ppid=1371 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:16.947000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 13:57:16.949000 audit[1425]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:16.949000 audit[1425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffe7fdeb00 a2=0 a3=1 items=0 ppid=1371 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:16.949000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 13:57:16.955000 audit[1429]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:16.955000 audit[1429]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffddc6c620 a2=0 a3=1 items=0 ppid=1371 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:16.955000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 13:57:16.966000 audit[1430]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:16.966000 audit[1430]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffff1254f50 a2=0 a3=1 items=0 ppid=1371 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:16.966000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 13:57:16.978428 kernel: Initializing XFRM netlink socket Dec 13 13:57:17.002723 env[1371]: time="2024-12-13T13:57:17.002421459Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 13:57:17.014000 audit[1438]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:17.014000 audit[1438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffed9fd270 a2=0 a3=1 items=0 ppid=1371 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:17.014000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 13:57:17.029000 audit[1441]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:17.029000 audit[1441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffdf91c3d0 a2=0 a3=1 items=0 ppid=1371 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:17.029000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 13:57:17.032000 audit[1444]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:17.032000 audit[1444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff65da8f0 a2=0 a3=1 items=0 ppid=1371 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:17.032000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 13:57:17.033000 audit[1446]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:17.033000 audit[1446]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff99cbd20 a2=0 a3=1 items=0 ppid=1371 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:17.033000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 13:57:17.035000 audit[1448]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:17.035000 audit[1448]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=fffffb12b390 a2=0 a3=1 items=0 ppid=1371 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:17.035000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 13:57:17.037000 audit[1450]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:17.037000 audit[1450]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=fffffd25a500 a2=0 a3=1 items=0 ppid=1371 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:17.037000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 13:57:17.039000 audit[1452]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:17.039000 audit[1452]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffff1920640 a2=0 a3=1 items=0 ppid=1371 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:17.039000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 13:57:17.047000 audit[1455]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:17.047000 audit[1455]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffffad9e860 a2=0 a3=1 items=0 ppid=1371 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:17.047000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 13:57:17.049000 audit[1457]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:17.049000 audit[1457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffffa5d35c0 a2=0 a3=1 items=0 ppid=1371 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:17.049000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 13:57:17.050000 audit[1459]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:17.050000 audit[1459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffe12ad040 a2=0 a3=1 items=0 ppid=1371 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:17.050000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 13:57:17.052000 audit[1461]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:17.052000 audit[1461]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd9375de0 a2=0 a3=1 items=0 ppid=1371 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:17.052000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 13:57:17.054353 systemd-networkd[1055]: docker0: Link UP Dec 13 13:57:17.060000 audit[1465]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:17.060000 audit[1465]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff8691ba0 a2=0 a3=1 items=0 ppid=1371 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:17.060000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 13:57:17.075000 audit[1466]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:17.075000 audit[1466]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe73d98f0 a2=0 a3=1 items=0 ppid=1371 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:17.075000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 13:57:17.077847 env[1371]: time="2024-12-13T13:57:17.077801122Z" level=info msg="Loading containers: done." Dec 13 13:57:17.097705 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4119037280-merged.mount: Deactivated successfully. Dec 13 13:57:17.101160 env[1371]: time="2024-12-13T13:57:17.101117324Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 13:57:17.101305 env[1371]: time="2024-12-13T13:57:17.101279940Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 13:57:17.101419 env[1371]: time="2024-12-13T13:57:17.101388350Z" level=info msg="Daemon has completed initialization" Dec 13 13:57:17.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:17.114610 systemd[1]: Started docker.service. Dec 13 13:57:17.123630 env[1371]: time="2024-12-13T13:57:17.123581789Z" level=info msg="API listen on /run/docker.sock" Dec 13 13:57:17.807506 env[1222]: time="2024-12-13T13:57:17.807426154Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 13:57:18.451475 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2940629886.mount: Deactivated successfully. Dec 13 13:57:19.958565 env[1222]: time="2024-12-13T13:57:19.956515925Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:19.961354 env[1222]: time="2024-12-13T13:57:19.961302445Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:50c86b7f73fdd28bacd4abf45260c9d3abc3b57eb038fa61fc45b5d0f2763e6f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:19.964337 env[1222]: time="2024-12-13T13:57:19.964289151Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:19.967151 env[1222]: time="2024-12-13T13:57:19.967095775Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:19.967548 env[1222]: time="2024-12-13T13:57:19.967451401Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:50c86b7f73fdd28bacd4abf45260c9d3abc3b57eb038fa61fc45b5d0f2763e6f\"" Dec 13 13:57:19.980833 env[1222]: time="2024-12-13T13:57:19.980776347Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 13:57:22.035120 env[1222]: time="2024-12-13T13:57:22.035038554Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:22.037248 env[1222]: time="2024-12-13T13:57:22.037209801Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2d47abaa6ccc533f84ef74fff6d509de10bb040317351b45afe95a8021a1ddf7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:22.039010 env[1222]: time="2024-12-13T13:57:22.038981925Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:22.041474 env[1222]: time="2024-12-13T13:57:22.041423721Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:22.042241 env[1222]: time="2024-12-13T13:57:22.042205098Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:2d47abaa6ccc533f84ef74fff6d509de10bb040317351b45afe95a8021a1ddf7\"" Dec 13 13:57:22.052104 env[1222]: time="2024-12-13T13:57:22.052074705Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 13:57:22.823909 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 13:57:22.824082 systemd[1]: Stopped kubelet.service. Dec 13 13:57:22.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:22.825508 systemd[1]: Starting kubelet.service... Dec 13 13:57:22.827789 kernel: kauditd_printk_skb: 84 callbacks suppressed Dec 13 13:57:22.827860 kernel: audit: type=1130 audit(1734098242.822:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:22.827884 kernel: audit: type=1131 audit(1734098242.822:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:22.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:22.907109 systemd[1]: Started kubelet.service. Dec 13 13:57:22.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:22.910480 kernel: audit: type=1130 audit(1734098242.906:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:22.945779 kubelet[1530]: E1213 13:57:22.945706 1530 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 13:57:22.948891 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 13:57:22.949014 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 13:57:22.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 13:57:22.952479 kernel: audit: type=1131 audit(1734098242.947:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 13:57:23.342026 env[1222]: time="2024-12-13T13:57:23.341978057Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:23.343516 env[1222]: time="2024-12-13T13:57:23.343488860Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ae633c52a23907b58f7a7867d2cccf3d3f5ebd8977beb6788e20fbecd3f446db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:23.346205 env[1222]: time="2024-12-13T13:57:23.346171323Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:23.347877 env[1222]: time="2024-12-13T13:57:23.347847928Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:23.348717 env[1222]: time="2024-12-13T13:57:23.348691975Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:ae633c52a23907b58f7a7867d2cccf3d3f5ebd8977beb6788e20fbecd3f446db\"" Dec 13 13:57:23.357321 env[1222]: time="2024-12-13T13:57:23.357297238Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 13:57:24.419404 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount714983706.mount: Deactivated successfully. Dec 13 13:57:24.954280 env[1222]: time="2024-12-13T13:57:24.954233660Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:24.956167 env[1222]: time="2024-12-13T13:57:24.956116049Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:768ee8cfd9311233d038d18430c18136e1ae4dd2e6de40fcf1c670bba2da6d06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:24.957851 env[1222]: time="2024-12-13T13:57:24.957813949Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:24.959752 env[1222]: time="2024-12-13T13:57:24.959711883Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:24.960290 env[1222]: time="2024-12-13T13:57:24.960258344Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:768ee8cfd9311233d038d18430c18136e1ae4dd2e6de40fcf1c670bba2da6d06\"" Dec 13 13:57:24.969814 env[1222]: time="2024-12-13T13:57:24.969770125Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 13:57:25.538560 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3564015435.mount: Deactivated successfully. Dec 13 13:57:26.380405 env[1222]: time="2024-12-13T13:57:26.379903512Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:26.381304 env[1222]: time="2024-12-13T13:57:26.381257624Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:26.383273 env[1222]: time="2024-12-13T13:57:26.383232964Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:26.385335 env[1222]: time="2024-12-13T13:57:26.385299617Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:26.386271 env[1222]: time="2024-12-13T13:57:26.386236081Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" Dec 13 13:57:26.395837 env[1222]: time="2024-12-13T13:57:26.395805822Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 13:57:26.877266 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount939501741.mount: Deactivated successfully. Dec 13 13:57:26.882898 env[1222]: time="2024-12-13T13:57:26.882843880Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:26.884675 env[1222]: time="2024-12-13T13:57:26.884634218Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:26.885872 env[1222]: time="2024-12-13T13:57:26.885833366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:26.887619 env[1222]: time="2024-12-13T13:57:26.887347751Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:26.887860 env[1222]: time="2024-12-13T13:57:26.887835927Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Dec 13 13:57:26.897149 env[1222]: time="2024-12-13T13:57:26.897117049Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 13:57:27.672534 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount372687561.mount: Deactivated successfully. Dec 13 13:57:29.839696 env[1222]: time="2024-12-13T13:57:29.839620650Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:29.978813 env[1222]: time="2024-12-13T13:57:29.978755056Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:29.982207 env[1222]: time="2024-12-13T13:57:29.982171523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:29.984419 env[1222]: time="2024-12-13T13:57:29.984385479Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:29.984897 env[1222]: time="2024-12-13T13:57:29.984868965Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b\"" Dec 13 13:57:33.199773 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 13:57:33.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:33.199949 systemd[1]: Stopped kubelet.service. Dec 13 13:57:33.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:33.201504 systemd[1]: Starting kubelet.service... Dec 13 13:57:33.204830 kernel: audit: type=1130 audit(1734098253.199:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:33.204894 kernel: audit: type=1131 audit(1734098253.199:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:33.282262 systemd[1]: Started kubelet.service. Dec 13 13:57:33.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:33.285469 kernel: audit: type=1130 audit(1734098253.281:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:33.319539 kubelet[1645]: E1213 13:57:33.319501 1645 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 13:57:33.322006 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 13:57:33.322126 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 13:57:33.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 13:57:33.325474 kernel: audit: type=1131 audit(1734098253.320:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 13:57:34.800639 systemd[1]: Stopped kubelet.service. Dec 13 13:57:34.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:34.802603 systemd[1]: Starting kubelet.service... Dec 13 13:57:34.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:34.805679 kernel: audit: type=1130 audit(1734098254.799:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:34.805750 kernel: audit: type=1131 audit(1734098254.799:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:34.819132 systemd[1]: Reloading. Dec 13 13:57:34.860901 /usr/lib/systemd/system-generators/torcx-generator[1679]: time="2024-12-13T13:57:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 13:57:34.860934 /usr/lib/systemd/system-generators/torcx-generator[1679]: time="2024-12-13T13:57:34Z" level=info msg="torcx already run" Dec 13 13:57:34.920439 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 13:57:34.920489 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 13:57:34.935915 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 13:57:34.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.989269 kernel: audit: type=1400 audit(1734098254.983:246): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.989308 kernel: audit: type=1400 audit(1734098254.983:247): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.989335 kernel: audit: type=1400 audit(1734098254.983:248): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.994100 kernel: audit: type=1400 audit(1734098254.983:249): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.985000 audit: BPF prog-id=40 op=LOAD Dec 13 13:57:34.985000 audit: BPF prog-id=24 op=UNLOAD Dec 13 13:57:34.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.987000 audit: BPF prog-id=41 op=LOAD Dec 13 13:57:34.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.987000 audit: BPF prog-id=42 op=LOAD Dec 13 13:57:34.987000 audit: BPF prog-id=25 op=UNLOAD Dec 13 13:57:34.987000 audit: BPF prog-id=26 op=UNLOAD Dec 13 13:57:34.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.990000 audit: BPF prog-id=43 op=LOAD Dec 13 13:57:34.990000 audit: BPF prog-id=27 op=UNLOAD Dec 13 13:57:34.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.992000 audit: BPF prog-id=44 op=LOAD Dec 13 13:57:34.992000 audit: BPF prog-id=38 op=UNLOAD Dec 13 13:57:34.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.993000 audit: BPF prog-id=45 op=LOAD Dec 13 13:57:34.993000 audit: BPF prog-id=33 op=UNLOAD Dec 13 13:57:34.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.994000 audit: BPF prog-id=46 op=LOAD Dec 13 13:57:34.994000 audit: BPF prog-id=34 op=UNLOAD Dec 13 13:57:34.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.995000 audit: BPF prog-id=47 op=LOAD Dec 13 13:57:34.995000 audit: BPF prog-id=28 op=UNLOAD Dec 13 13:57:34.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit: BPF prog-id=48 op=LOAD Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit: BPF prog-id=49 op=LOAD Dec 13 13:57:34.996000 audit: BPF prog-id=29 op=UNLOAD Dec 13 13:57:34.996000 audit: BPF prog-id=30 op=UNLOAD Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit: BPF prog-id=50 op=LOAD Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.996000 audit: BPF prog-id=51 op=LOAD Dec 13 13:57:34.996000 audit: BPF prog-id=31 op=UNLOAD Dec 13 13:57:34.996000 audit: BPF prog-id=32 op=UNLOAD Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit: BPF prog-id=52 op=LOAD Dec 13 13:57:34.997000 audit: BPF prog-id=35 op=UNLOAD Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit: BPF prog-id=53 op=LOAD Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:34.997000 audit: BPF prog-id=54 op=LOAD Dec 13 13:57:34.997000 audit: BPF prog-id=36 op=UNLOAD Dec 13 13:57:34.997000 audit: BPF prog-id=37 op=UNLOAD Dec 13 13:57:35.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:35.009221 systemd[1]: Started kubelet.service. Dec 13 13:57:35.010894 systemd[1]: Stopping kubelet.service... Dec 13 13:57:35.011287 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 13:57:35.011547 systemd[1]: Stopped kubelet.service. Dec 13 13:57:35.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:35.013325 systemd[1]: Starting kubelet.service... Dec 13 13:57:35.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:35.103116 systemd[1]: Started kubelet.service. Dec 13 13:57:35.150750 kubelet[1724]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 13:57:35.150750 kubelet[1724]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 13:57:35.150750 kubelet[1724]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 13:57:35.151128 kubelet[1724]: I1213 13:57:35.150783 1724 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 13:57:36.157622 kubelet[1724]: I1213 13:57:36.157585 1724 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 13:57:36.157942 kubelet[1724]: I1213 13:57:36.157928 1724 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 13:57:36.158220 kubelet[1724]: I1213 13:57:36.158200 1724 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 13:57:36.186046 kubelet[1724]: I1213 13:57:36.186005 1724 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 13:57:36.186820 kubelet[1724]: E1213 13:57:36.186803 1724 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.25:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.25:6443: connect: connection refused Dec 13 13:57:36.192851 kubelet[1724]: I1213 13:57:36.192819 1724 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 13:57:36.193910 kubelet[1724]: I1213 13:57:36.193884 1724 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 13:57:36.194082 kubelet[1724]: I1213 13:57:36.194066 1724 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 13:57:36.194172 kubelet[1724]: I1213 13:57:36.194090 1724 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 13:57:36.194172 kubelet[1724]: I1213 13:57:36.194099 1724 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 13:57:36.194216 kubelet[1724]: I1213 13:57:36.194204 1724 state_mem.go:36] "Initialized new in-memory state store" Dec 13 13:57:36.196491 kubelet[1724]: I1213 13:57:36.196468 1724 kubelet.go:396] "Attempting to sync node with API server" Dec 13 13:57:36.196545 kubelet[1724]: I1213 13:57:36.196494 1724 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 13:57:36.196545 kubelet[1724]: I1213 13:57:36.196519 1724 kubelet.go:312] "Adding apiserver pod source" Dec 13 13:57:36.196640 kubelet[1724]: I1213 13:57:36.196619 1724 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 13:57:36.197516 kubelet[1724]: W1213 13:57:36.197468 1724 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.0.0.25:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.25:6443: connect: connection refused Dec 13 13:57:36.197516 kubelet[1724]: W1213 13:57:36.197494 1724 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.0.0.25:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.25:6443: connect: connection refused Dec 13 13:57:36.197575 kubelet[1724]: E1213 13:57:36.197520 1724 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.25:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.25:6443: connect: connection refused Dec 13 13:57:36.197575 kubelet[1724]: E1213 13:57:36.197535 1724 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.25:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.25:6443: connect: connection refused Dec 13 13:57:36.197899 kubelet[1724]: I1213 13:57:36.197866 1724 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 13:57:36.198298 kubelet[1724]: I1213 13:57:36.198271 1724 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 13:57:36.198894 kubelet[1724]: W1213 13:57:36.198865 1724 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 13:57:36.199727 kubelet[1724]: I1213 13:57:36.199712 1724 server.go:1256] "Started kubelet" Dec 13 13:57:36.199951 kubelet[1724]: I1213 13:57:36.199933 1724 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 13:57:36.200163 kubelet[1724]: I1213 13:57:36.200145 1724 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 13:57:36.200406 kubelet[1724]: I1213 13:57:36.200390 1724 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 13:57:36.200743 kubelet[1724]: I1213 13:57:36.200727 1724 server.go:461] "Adding debug handlers to kubelet server" Dec 13 13:57:36.204000 audit[1724]: AVC avc: denied { mac_admin } for pid=1724 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:36.204000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 13:57:36.204000 audit[1724]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b48450 a1=4000995308 a2=4000b48420 a3=25 items=0 ppid=1 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:36.204000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 13:57:36.204000 audit[1724]: AVC avc: denied { mac_admin } for pid=1724 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:36.204000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 13:57:36.204000 audit[1724]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b2c700 a1=4000995320 a2=4000b484e0 a3=25 items=0 ppid=1 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:36.204000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 13:57:36.206250 kubelet[1724]: I1213 13:57:36.205962 1724 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 13:57:36.206250 kubelet[1724]: I1213 13:57:36.205999 1724 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 13:57:36.206250 kubelet[1724]: I1213 13:57:36.206070 1724 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 13:57:36.206791 kubelet[1724]: I1213 13:57:36.206770 1724 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 13:57:36.206988 kubelet[1724]: I1213 13:57:36.206973 1724 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 13:57:36.207194 kubelet[1724]: I1213 13:57:36.207171 1724 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 13:57:36.208275 kubelet[1724]: W1213 13:57:36.208217 1724 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.0.0.25:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.25:6443: connect: connection refused Dec 13 13:57:36.208275 kubelet[1724]: E1213 13:57:36.208271 1724 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.25:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.25:6443: connect: connection refused Dec 13 13:57:36.209088 kubelet[1724]: E1213 13:57:36.209052 1724 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.25:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.25:6443: connect: connection refused" interval="200ms" Dec 13 13:57:36.209545 kubelet[1724]: E1213 13:57:36.209510 1724 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 13:57:36.209919 kubelet[1724]: I1213 13:57:36.209887 1724 factory.go:221] Registration of the systemd container factory successfully Dec 13 13:57:36.210095 kubelet[1724]: I1213 13:57:36.210064 1724 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 13:57:36.211445 kubelet[1724]: E1213 13:57:36.211340 1724 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.25:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.25:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.1810c12d26681869 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 13:57:36.199686249 +0000 UTC m=+1.091389528,LastTimestamp:2024-12-13 13:57:36.199686249 +0000 UTC m=+1.091389528,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 13:57:36.212472 kubelet[1724]: I1213 13:57:36.212424 1724 factory.go:221] Registration of the containerd container factory successfully Dec 13 13:57:36.222000 audit[1737]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:36.222000 audit[1737]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe80aed40 a2=0 a3=1 items=0 ppid=1724 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:36.222000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 13:57:36.224000 audit[1740]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:36.224000 audit[1740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe4d2fc90 a2=0 a3=1 items=0 ppid=1724 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:36.224000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 13:57:36.226971 kubelet[1724]: I1213 13:57:36.226940 1724 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 13:57:36.226971 kubelet[1724]: I1213 13:57:36.226971 1724 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 13:57:36.227099 kubelet[1724]: I1213 13:57:36.226987 1724 state_mem.go:36] "Initialized new in-memory state store" Dec 13 13:57:36.226000 audit[1743]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:36.226000 audit[1743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd0244a00 a2=0 a3=1 items=0 ppid=1724 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:36.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 13:57:36.228000 audit[1745]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:36.228000 audit[1745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd3d931d0 a2=0 a3=1 items=0 ppid=1724 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:36.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 13:57:36.308326 kubelet[1724]: I1213 13:57:36.308286 1724 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 13:57:36.308750 kubelet[1724]: E1213 13:57:36.308722 1724 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.25:6443/api/v1/nodes\": dial tcp 10.0.0.25:6443: connect: connection refused" node="localhost" Dec 13 13:57:36.372686 kubelet[1724]: I1213 13:57:36.372631 1724 policy_none.go:49] "None policy: Start" Dec 13 13:57:36.373520 kubelet[1724]: I1213 13:57:36.373503 1724 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 13:57:36.373642 kubelet[1724]: I1213 13:57:36.373631 1724 state_mem.go:35] "Initializing new in-memory state store" Dec 13 13:57:36.379559 systemd[1]: Created slice kubepods.slice. Dec 13 13:57:36.380000 audit[1749]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:36.380000 audit[1749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffeb46a3f0 a2=0 a3=1 items=0 ppid=1724 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:36.380000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 13:57:36.381988 kubelet[1724]: I1213 13:57:36.381769 1724 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 13:57:36.381000 audit[1751]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:36.381000 audit[1751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc3e312b0 a2=0 a3=1 items=0 ppid=1724 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:36.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 13:57:36.383099 kubelet[1724]: I1213 13:57:36.383077 1724 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 13:57:36.383151 kubelet[1724]: I1213 13:57:36.383101 1724 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 13:57:36.383151 kubelet[1724]: I1213 13:57:36.383120 1724 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 13:57:36.383197 kubelet[1724]: E1213 13:57:36.383176 1724 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 13:57:36.383505 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 13:57:36.382000 audit[1752]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:36.382000 audit[1752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe0443560 a2=0 a3=1 items=0 ppid=1724 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:36.382000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 13:57:36.384051 kubelet[1724]: W1213 13:57:36.384024 1724 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.0.0.25:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.25:6443: connect: connection refused Dec 13 13:57:36.384128 kubelet[1724]: E1213 13:57:36.384117 1724 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.25:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.25:6443: connect: connection refused Dec 13 13:57:36.383000 audit[1753]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:36.383000 audit[1753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff3a1c9a0 a2=0 a3=1 items=0 ppid=1724 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:36.383000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 13:57:36.383000 audit[1754]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:36.383000 audit[1754]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe9b9f870 a2=0 a3=1 items=0 ppid=1724 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:36.383000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 13:57:36.383000 audit[1755]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:36.383000 audit[1755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd4fb5790 a2=0 a3=1 items=0 ppid=1724 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:36.383000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 13:57:36.384000 audit[1756]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:36.384000 audit[1756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeed81bf0 a2=0 a3=1 items=0 ppid=1724 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:36.384000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 13:57:36.384000 audit[1757]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:36.384000 audit[1757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe8394580 a2=0 a3=1 items=0 ppid=1724 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:36.384000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 13:57:36.387443 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 13:57:36.400105 kubelet[1724]: I1213 13:57:36.400067 1724 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 13:57:36.400180 kubelet[1724]: I1213 13:57:36.400146 1724 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 13:57:36.398000 audit[1724]: AVC avc: denied { mac_admin } for pid=1724 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:36.398000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 13:57:36.398000 audit[1724]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000676600 a1=4000975608 a2=40006765d0 a3=25 items=0 ppid=1 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:36.398000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 13:57:36.400338 kubelet[1724]: I1213 13:57:36.400310 1724 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 13:57:36.403008 kubelet[1724]: E1213 13:57:36.402981 1724 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Dec 13 13:57:36.409656 kubelet[1724]: E1213 13:57:36.409580 1724 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.25:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.25:6443: connect: connection refused" interval="400ms" Dec 13 13:57:36.483956 kubelet[1724]: I1213 13:57:36.483923 1724 topology_manager.go:215] "Topology Admit Handler" podUID="938802e490bfb06a072a9fb95f7475d8" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 13:57:36.484974 kubelet[1724]: I1213 13:57:36.484954 1724 topology_manager.go:215] "Topology Admit Handler" podUID="4f8e0d694c07e04969646aa3c152c34a" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 13:57:36.485854 kubelet[1724]: I1213 13:57:36.485834 1724 topology_manager.go:215] "Topology Admit Handler" podUID="c4144e8f85b2123a6afada0c1705bbba" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 13:57:36.490279 systemd[1]: Created slice kubepods-burstable-pod938802e490bfb06a072a9fb95f7475d8.slice. Dec 13 13:57:36.508921 kubelet[1724]: I1213 13:57:36.508895 1724 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/938802e490bfb06a072a9fb95f7475d8-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"938802e490bfb06a072a9fb95f7475d8\") " pod="kube-system/kube-apiserver-localhost" Dec 13 13:57:36.508999 kubelet[1724]: I1213 13:57:36.508932 1724 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/938802e490bfb06a072a9fb95f7475d8-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"938802e490bfb06a072a9fb95f7475d8\") " pod="kube-system/kube-apiserver-localhost" Dec 13 13:57:36.508999 kubelet[1724]: I1213 13:57:36.508954 1724 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 13:57:36.508999 kubelet[1724]: I1213 13:57:36.508972 1724 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/938802e490bfb06a072a9fb95f7475d8-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"938802e490bfb06a072a9fb95f7475d8\") " pod="kube-system/kube-apiserver-localhost" Dec 13 13:57:36.508999 kubelet[1724]: I1213 13:57:36.508992 1724 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 13:57:36.509137 kubelet[1724]: I1213 13:57:36.509021 1724 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 13:57:36.509137 kubelet[1724]: I1213 13:57:36.509043 1724 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c4144e8f85b2123a6afada0c1705bbba-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"c4144e8f85b2123a6afada0c1705bbba\") " pod="kube-system/kube-scheduler-localhost" Dec 13 13:57:36.509137 kubelet[1724]: I1213 13:57:36.509062 1724 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 13:57:36.509137 kubelet[1724]: I1213 13:57:36.509084 1724 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 13:57:36.509758 systemd[1]: Created slice kubepods-burstable-podc4144e8f85b2123a6afada0c1705bbba.slice. Dec 13 13:57:36.510118 kubelet[1724]: I1213 13:57:36.510094 1724 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 13:57:36.510388 kubelet[1724]: E1213 13:57:36.510367 1724 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.25:6443/api/v1/nodes\": dial tcp 10.0.0.25:6443: connect: connection refused" node="localhost" Dec 13 13:57:36.512354 systemd[1]: Created slice kubepods-burstable-pod4f8e0d694c07e04969646aa3c152c34a.slice. Dec 13 13:57:36.809068 kubelet[1724]: E1213 13:57:36.808971 1724 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:36.809925 env[1222]: time="2024-12-13T13:57:36.809649455Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:938802e490bfb06a072a9fb95f7475d8,Namespace:kube-system,Attempt:0,}" Dec 13 13:57:36.810271 kubelet[1724]: E1213 13:57:36.810220 1724 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.25:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.25:6443: connect: connection refused" interval="800ms" Dec 13 13:57:36.811510 kubelet[1724]: E1213 13:57:36.811485 1724 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:36.811869 env[1222]: time="2024-12-13T13:57:36.811842903Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:c4144e8f85b2123a6afada0c1705bbba,Namespace:kube-system,Attempt:0,}" Dec 13 13:57:36.814020 kubelet[1724]: E1213 13:57:36.813989 1724 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:36.814318 env[1222]: time="2024-12-13T13:57:36.814290300Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:4f8e0d694c07e04969646aa3c152c34a,Namespace:kube-system,Attempt:0,}" Dec 13 13:57:36.911957 kubelet[1724]: I1213 13:57:36.911932 1724 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 13:57:36.912244 kubelet[1724]: E1213 13:57:36.912229 1724 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.25:6443/api/v1/nodes\": dial tcp 10.0.0.25:6443: connect: connection refused" node="localhost" Dec 13 13:57:37.293163 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4285020170.mount: Deactivated successfully. Dec 13 13:57:37.296574 env[1222]: time="2024-12-13T13:57:37.296513044Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:37.299266 env[1222]: time="2024-12-13T13:57:37.299226421Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:37.305663 env[1222]: time="2024-12-13T13:57:37.305595947Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:37.307315 env[1222]: time="2024-12-13T13:57:37.307290741Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:37.309616 env[1222]: time="2024-12-13T13:57:37.309589060Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:37.312614 env[1222]: time="2024-12-13T13:57:37.312583014Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:37.314877 env[1222]: time="2024-12-13T13:57:37.314849774Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:37.316740 env[1222]: time="2024-12-13T13:57:37.316717777Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:37.317467 env[1222]: time="2024-12-13T13:57:37.317422823Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:37.318304 env[1222]: time="2024-12-13T13:57:37.318277048Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:37.319014 env[1222]: time="2024-12-13T13:57:37.318989103Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:37.319880 env[1222]: time="2024-12-13T13:57:37.319855823Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:37.345125 env[1222]: time="2024-12-13T13:57:37.344959957Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:57:37.345125 env[1222]: time="2024-12-13T13:57:37.344991554Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:57:37.345125 env[1222]: time="2024-12-13T13:57:37.345001526Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:57:37.345125 env[1222]: time="2024-12-13T13:57:37.344868687Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:57:37.345125 env[1222]: time="2024-12-13T13:57:37.344906252Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:57:37.345125 env[1222]: time="2024-12-13T13:57:37.344915824Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:57:37.345343 env[1222]: time="2024-12-13T13:57:37.345221470Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/868ec23ab55fb989fa61c528a2e99a7253700da68ffa332c01bb4d04597acacb pid=1783 runtime=io.containerd.runc.v2 Dec 13 13:57:37.345343 env[1222]: time="2024-12-13T13:57:37.345182023Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:57:37.345343 env[1222]: time="2024-12-13T13:57:37.345227237Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:57:37.345343 env[1222]: time="2024-12-13T13:57:37.345237530Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:57:37.345541 env[1222]: time="2024-12-13T13:57:37.345498163Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c830e9606ca364a1b5789584786bd86a2f058546b91ea4d8ecc6e2eef0a732fb pid=1785 runtime=io.containerd.runc.v2 Dec 13 13:57:37.348396 env[1222]: time="2024-12-13T13:57:37.348325196Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/183fae4902d996d43449fff735765b1932e30239dd47683656ad47ff5363651b pid=1784 runtime=io.containerd.runc.v2 Dec 13 13:57:37.359211 systemd[1]: Started cri-containerd-c830e9606ca364a1b5789584786bd86a2f058546b91ea4d8ecc6e2eef0a732fb.scope. Dec 13 13:57:37.361430 systemd[1]: Started cri-containerd-868ec23ab55fb989fa61c528a2e99a7253700da68ffa332c01bb4d04597acacb.scope. Dec 13 13:57:37.365865 systemd[1]: Started cri-containerd-183fae4902d996d43449fff735765b1932e30239dd47683656ad47ff5363651b.scope. Dec 13 13:57:37.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.394000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.394000 audit: BPF prog-id=55 op=LOAD Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1785 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338333065393630366361333634613162353738393538343738366264 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1785 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338333065393630366361333634613162353738393538343738366264 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit: BPF prog-id=56 op=LOAD Dec 13 13:57:37.395000 audit[1813]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1785 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338333065393630366361333634613162353738393538343738366264 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit: BPF prog-id=57 op=LOAD Dec 13 13:57:37.395000 audit[1813]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1785 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338333065393630366361333634613162353738393538343738366264 Dec 13 13:57:37.395000 audit: BPF prog-id=57 op=UNLOAD Dec 13 13:57:37.395000 audit: BPF prog-id=56 op=UNLOAD Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.395000 audit: BPF prog-id=58 op=LOAD Dec 13 13:57:37.395000 audit[1813]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1785 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338333065393630366361333634613162353738393538343738366264 Dec 13 13:57:37.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit: BPF prog-id=59 op=LOAD Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=1783 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836386563323361623535666239383966613631633532386132653939 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=1783 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836386563323361623535666239383966613631633532386132653939 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit: BPF prog-id=60 op=LOAD Dec 13 13:57:37.398000 audit[1810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=1783 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836386563323361623535666239383966613631633532386132653939 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit: BPF prog-id=61 op=LOAD Dec 13 13:57:37.398000 audit[1810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=1783 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836386563323361623535666239383966613631633532386132653939 Dec 13 13:57:37.398000 audit: BPF prog-id=61 op=UNLOAD Dec 13 13:57:37.398000 audit: BPF prog-id=60 op=UNLOAD Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.398000 audit: BPF prog-id=62 op=LOAD Dec 13 13:57:37.398000 audit[1810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=1783 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836386563323361623535666239383966613631633532386132653939 Dec 13 13:57:37.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit: BPF prog-id=63 op=LOAD Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1784 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138336661653439303264393936643433343439666666373335373635 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1784 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138336661653439303264393936643433343439666666373335373635 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit: BPF prog-id=64 op=LOAD Dec 13 13:57:37.401000 audit[1814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1784 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138336661653439303264393936643433343439666666373335373635 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit: BPF prog-id=65 op=LOAD Dec 13 13:57:37.401000 audit[1814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1784 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138336661653439303264393936643433343439666666373335373635 Dec 13 13:57:37.401000 audit: BPF prog-id=65 op=UNLOAD Dec 13 13:57:37.401000 audit: BPF prog-id=64 op=UNLOAD Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.401000 audit: BPF prog-id=66 op=LOAD Dec 13 13:57:37.401000 audit[1814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1784 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138336661653439303264393936643433343439666666373335373635 Dec 13 13:57:37.419378 env[1222]: time="2024-12-13T13:57:37.419341198Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:c4144e8f85b2123a6afada0c1705bbba,Namespace:kube-system,Attempt:0,} returns sandbox id \"c830e9606ca364a1b5789584786bd86a2f058546b91ea4d8ecc6e2eef0a732fb\"" Dec 13 13:57:37.420743 kubelet[1724]: E1213 13:57:37.420561 1724 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:37.423434 env[1222]: time="2024-12-13T13:57:37.422415849Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:938802e490bfb06a072a9fb95f7475d8,Namespace:kube-system,Attempt:0,} returns sandbox id \"868ec23ab55fb989fa61c528a2e99a7253700da68ffa332c01bb4d04597acacb\"" Dec 13 13:57:37.423806 kubelet[1724]: E1213 13:57:37.423653 1724 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:37.423887 env[1222]: time="2024-12-13T13:57:37.423660263Z" level=info msg="CreateContainer within sandbox \"c830e9606ca364a1b5789584786bd86a2f058546b91ea4d8ecc6e2eef0a732fb\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 13:57:37.425563 env[1222]: time="2024-12-13T13:57:37.425492542Z" level=info msg="CreateContainer within sandbox \"868ec23ab55fb989fa61c528a2e99a7253700da68ffa332c01bb4d04597acacb\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 13:57:37.430695 env[1222]: time="2024-12-13T13:57:37.430661987Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:4f8e0d694c07e04969646aa3c152c34a,Namespace:kube-system,Attempt:0,} returns sandbox id \"183fae4902d996d43449fff735765b1932e30239dd47683656ad47ff5363651b\"" Dec 13 13:57:37.431382 kubelet[1724]: E1213 13:57:37.431239 1724 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:37.433569 env[1222]: time="2024-12-13T13:57:37.433040642Z" level=info msg="CreateContainer within sandbox \"183fae4902d996d43449fff735765b1932e30239dd47683656ad47ff5363651b\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 13:57:37.436629 env[1222]: time="2024-12-13T13:57:37.436588621Z" level=info msg="CreateContainer within sandbox \"c830e9606ca364a1b5789584786bd86a2f058546b91ea4d8ecc6e2eef0a732fb\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"8fc8d8b34b564389e962f479a792c484000145c58e3269628c1462f42a77419a\"" Dec 13 13:57:37.437164 env[1222]: time="2024-12-13T13:57:37.437126066Z" level=info msg="StartContainer for \"8fc8d8b34b564389e962f479a792c484000145c58e3269628c1462f42a77419a\"" Dec 13 13:57:37.439012 kubelet[1724]: W1213 13:57:37.438934 1724 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.0.0.25:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.25:6443: connect: connection refused Dec 13 13:57:37.439012 kubelet[1724]: E1213 13:57:37.438989 1724 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.25:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.25:6443: connect: connection refused Dec 13 13:57:37.440400 env[1222]: time="2024-12-13T13:57:37.440353540Z" level=info msg="CreateContainer within sandbox \"868ec23ab55fb989fa61c528a2e99a7253700da68ffa332c01bb4d04597acacb\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"539d72dab7fb5813d222218a739517aa3d865d08ebc60630b9a993a28bb8640c\"" Dec 13 13:57:37.440733 env[1222]: time="2024-12-13T13:57:37.440698835Z" level=info msg="StartContainer for \"539d72dab7fb5813d222218a739517aa3d865d08ebc60630b9a993a28bb8640c\"" Dec 13 13:57:37.452404 systemd[1]: Started cri-containerd-8fc8d8b34b564389e962f479a792c484000145c58e3269628c1462f42a77419a.scope. Dec 13 13:57:37.455630 env[1222]: time="2024-12-13T13:57:37.455498479Z" level=info msg="CreateContainer within sandbox \"183fae4902d996d43449fff735765b1932e30239dd47683656ad47ff5363651b\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"2e145162e093733a29bda2537410fcb143ab2fbb4f7be659d1675a0cf04bf9c9\"" Dec 13 13:57:37.456092 env[1222]: time="2024-12-13T13:57:37.456068643Z" level=info msg="StartContainer for \"2e145162e093733a29bda2537410fcb143ab2fbb4f7be659d1675a0cf04bf9c9\"" Dec 13 13:57:37.463262 systemd[1]: Started cri-containerd-539d72dab7fb5813d222218a739517aa3d865d08ebc60630b9a993a28bb8640c.scope. Dec 13 13:57:37.480733 systemd[1]: Started cri-containerd-2e145162e093733a29bda2537410fcb143ab2fbb4f7be659d1675a0cf04bf9c9.scope. Dec 13 13:57:37.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit: BPF prog-id=67 op=LOAD Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1902]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1785 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866633864386233346235363433383965393632663437396137393263 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1902]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1785 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866633864386233346235363433383965393632663437396137393263 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit: BPF prog-id=68 op=LOAD Dec 13 13:57:37.494000 audit[1902]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1785 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866633864386233346235363433383965393632663437396137393263 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.494000 audit: BPF prog-id=69 op=LOAD Dec 13 13:57:37.494000 audit[1902]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1785 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866633864386233346235363433383965393632663437396137393263 Dec 13 13:57:37.495000 audit: BPF prog-id=69 op=UNLOAD Dec 13 13:57:37.495000 audit: BPF prog-id=68 op=UNLOAD Dec 13 13:57:37.495000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.495000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.495000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.495000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.495000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.495000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.495000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.495000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.495000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.495000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.495000 audit: BPF prog-id=70 op=LOAD Dec 13 13:57:37.495000 audit[1902]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1785 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866633864386233346235363433383965393632663437396137393263 Dec 13 13:57:37.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.503000 audit: BPF prog-id=71 op=LOAD Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=1783 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533396437326461623766623538313364323232323138613733393531 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=1783 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533396437326461623766623538313364323232323138613733393531 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit: BPF prog-id=72 op=LOAD Dec 13 13:57:37.504000 audit[1913]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=1783 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533396437326461623766623538313364323232323138613733393531 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit: BPF prog-id=73 op=LOAD Dec 13 13:57:37.504000 audit[1913]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=1783 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533396437326461623766623538313364323232323138613733393531 Dec 13 13:57:37.504000 audit: BPF prog-id=73 op=UNLOAD Dec 13 13:57:37.504000 audit: BPF prog-id=72 op=UNLOAD Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.504000 audit: BPF prog-id=74 op=LOAD Dec 13 13:57:37.504000 audit[1913]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=1783 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533396437326461623766623538313364323232323138613733393531 Dec 13 13:57:37.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.509000 audit: BPF prog-id=75 op=LOAD Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1784 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313435313632653039333733336132396264613235333734313066 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1784 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313435313632653039333733336132396264613235333734313066 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit: BPF prog-id=76 op=LOAD Dec 13 13:57:37.510000 audit[1941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1784 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313435313632653039333733336132396264613235333734313066 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit: BPF prog-id=77 op=LOAD Dec 13 13:57:37.510000 audit[1941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1784 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313435313632653039333733336132396264613235333734313066 Dec 13 13:57:37.510000 audit: BPF prog-id=77 op=UNLOAD Dec 13 13:57:37.510000 audit: BPF prog-id=76 op=UNLOAD Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { perfmon } for pid=1941 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit[1941]: AVC avc: denied { bpf } for pid=1941 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:37.510000 audit: BPF prog-id=78 op=LOAD Dec 13 13:57:37.510000 audit[1941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1784 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:37.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313435313632653039333733336132396264613235333734313066 Dec 13 13:57:37.524008 env[1222]: time="2024-12-13T13:57:37.523970748Z" level=info msg="StartContainer for \"8fc8d8b34b564389e962f479a792c484000145c58e3269628c1462f42a77419a\" returns successfully" Dec 13 13:57:37.540259 env[1222]: time="2024-12-13T13:57:37.540216088Z" level=info msg="StartContainer for \"539d72dab7fb5813d222218a739517aa3d865d08ebc60630b9a993a28bb8640c\" returns successfully" Dec 13 13:57:37.540616 env[1222]: time="2024-12-13T13:57:37.540586613Z" level=info msg="StartContainer for \"2e145162e093733a29bda2537410fcb143ab2fbb4f7be659d1675a0cf04bf9c9\" returns successfully" Dec 13 13:57:37.615318 kubelet[1724]: E1213 13:57:37.615216 1724 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.25:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.25:6443: connect: connection refused" interval="1.6s" Dec 13 13:57:37.694821 kubelet[1724]: W1213 13:57:37.694774 1724 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.0.0.25:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.25:6443: connect: connection refused Dec 13 13:57:37.694821 kubelet[1724]: E1213 13:57:37.694820 1724 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.25:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.25:6443: connect: connection refused Dec 13 13:57:37.713550 kubelet[1724]: I1213 13:57:37.713517 1724 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 13:57:37.713932 kubelet[1724]: E1213 13:57:37.713915 1724 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.25:6443/api/v1/nodes\": dial tcp 10.0.0.25:6443: connect: connection refused" node="localhost" Dec 13 13:57:37.727616 kubelet[1724]: W1213 13:57:37.727560 1724 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.0.0.25:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.25:6443: connect: connection refused Dec 13 13:57:37.727672 kubelet[1724]: E1213 13:57:37.727623 1724 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.25:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.25:6443: connect: connection refused Dec 13 13:57:38.390705 kubelet[1724]: E1213 13:57:38.390665 1724 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:38.391313 kubelet[1724]: E1213 13:57:38.391280 1724 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:38.393558 kubelet[1724]: E1213 13:57:38.393533 1724 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:39.237954 kernel: kauditd_printk_skb: 561 callbacks suppressed Dec 13 13:57:39.238084 kernel: audit: type=1400 audit(1734098259.233:544): avc: denied { watch } for pid=1952 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:57:39.233000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:57:39.233000 audit[1952]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4005bbaed0 a2=fc6 a3=0 items=0 ppid=1783 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 key=(null) Dec 13 13:57:39.242072 kernel: audit: type=1300 audit(1734098259.233:544): arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4005bbaed0 a2=fc6 a3=0 items=0 ppid=1783 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 key=(null) Dec 13 13:57:39.233000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 13:57:39.245552 kernel: audit: type=1327 audit(1734098259.233:544): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 13:57:39.245000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:57:39.245000 audit[1952]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4003300150 a2=fc6 a3=0 items=0 ppid=1783 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 key=(null) Dec 13 13:57:39.250499 kernel: audit: type=1400 audit(1734098259.245:545): avc: denied { watch } for pid=1952 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:57:39.245000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 13:57:39.266888 kernel: audit: type=1300 audit(1734098259.245:545): arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4003300150 a2=fc6 a3=0 items=0 ppid=1783 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 key=(null) Dec 13 13:57:39.266965 kernel: audit: type=1327 audit(1734098259.245:545): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 13:57:39.245000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:57:39.271442 kernel: audit: type=1400 audit(1734098259.245:546): avc: denied { watch } for pid=1952 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:57:39.245000 audit[1952]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40031e3000 a2=fc6 a3=0 items=0 ppid=1783 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 key=(null) Dec 13 13:57:39.275807 kernel: audit: type=1300 audit(1734098259.245:546): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40031e3000 a2=fc6 a3=0 items=0 ppid=1783 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 key=(null) Dec 13 13:57:39.245000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 13:57:39.279318 kernel: audit: type=1327 audit(1734098259.245:546): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 13:57:39.279395 kernel: audit: type=1400 audit(1734098259.249:547): avc: denied { watch } for pid=1952 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:57:39.249000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:57:39.249000 audit[1952]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4b a1=4004a728a0 a2=fc6 a3=0 items=0 ppid=1783 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 key=(null) Dec 13 13:57:39.249000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 13:57:39.260000 audit[1959]: AVC avc: denied { watch } for pid=1959 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:57:39.260000 audit[1959]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40007f4570 a2=fc6 a3=0 items=0 ppid=1784 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 key=(null) Dec 13 13:57:39.260000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 13:57:39.260000 audit[1959]: AVC avc: denied { watch } for pid=1959 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:57:39.260000 audit[1959]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400050afa0 a2=fc6 a3=0 items=0 ppid=1784 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 key=(null) Dec 13 13:57:39.260000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 13:57:39.289000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:57:39.289000 audit[1952]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=40040e0fc0 a2=fc6 a3=0 items=0 ppid=1783 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 key=(null) Dec 13 13:57:39.289000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 13:57:39.289000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:57:39.289000 audit[1952]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=4006852960 a2=fc6 a3=0 items=0 ppid=1783 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 key=(null) Dec 13 13:57:39.289000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 13:57:39.301873 kubelet[1724]: E1213 13:57:39.301841 1724 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Dec 13 13:57:39.315690 kubelet[1724]: I1213 13:57:39.315551 1724 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 13:57:39.330365 kubelet[1724]: I1213 13:57:39.330308 1724 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 13:57:39.337185 kubelet[1724]: E1213 13:57:39.337163 1724 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 13:57:39.394982 kubelet[1724]: E1213 13:57:39.394903 1724 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:39.437977 kubelet[1724]: E1213 13:57:39.437940 1724 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 13:57:39.538843 kubelet[1724]: E1213 13:57:39.538737 1724 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 13:57:39.639380 kubelet[1724]: E1213 13:57:39.639341 1724 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 13:57:39.740242 kubelet[1724]: E1213 13:57:39.740214 1724 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 13:57:39.840872 kubelet[1724]: E1213 13:57:39.840761 1724 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 13:57:39.941356 kubelet[1724]: E1213 13:57:39.941311 1724 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 13:57:40.041880 kubelet[1724]: E1213 13:57:40.041850 1724 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 13:57:40.142473 kubelet[1724]: E1213 13:57:40.142381 1724 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 13:57:40.182148 kubelet[1724]: E1213 13:57:40.182127 1724 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:41.199562 kubelet[1724]: I1213 13:57:41.199524 1724 apiserver.go:52] "Watching apiserver" Dec 13 13:57:41.207933 kubelet[1724]: I1213 13:57:41.207904 1724 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 13:57:41.296576 kubelet[1724]: E1213 13:57:41.296557 1724 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:41.395795 kubelet[1724]: E1213 13:57:41.395777 1724 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:42.238138 systemd[1]: Reloading. Dec 13 13:57:42.292164 /usr/lib/systemd/system-generators/torcx-generator[2032]: time="2024-12-13T13:57:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 13:57:42.292192 /usr/lib/systemd/system-generators/torcx-generator[2032]: time="2024-12-13T13:57:42Z" level=info msg="torcx already run" Dec 13 13:57:42.349196 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 13:57:42.349217 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 13:57:42.364336 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 13:57:42.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.421000 audit: BPF prog-id=79 op=LOAD Dec 13 13:57:42.421000 audit: BPF prog-id=55 op=UNLOAD Dec 13 13:57:42.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.422000 audit: BPF prog-id=80 op=LOAD Dec 13 13:57:42.422000 audit: BPF prog-id=71 op=UNLOAD Dec 13 13:57:42.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit: BPF prog-id=81 op=LOAD Dec 13 13:57:42.423000 audit: BPF prog-id=40 op=UNLOAD Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit: BPF prog-id=82 op=LOAD Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit: BPF prog-id=83 op=LOAD Dec 13 13:57:42.423000 audit: BPF prog-id=41 op=UNLOAD Dec 13 13:57:42.423000 audit: BPF prog-id=42 op=UNLOAD Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.423000 audit: BPF prog-id=84 op=LOAD Dec 13 13:57:42.423000 audit: BPF prog-id=43 op=UNLOAD Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit: BPF prog-id=85 op=LOAD Dec 13 13:57:42.424000 audit: BPF prog-id=75 op=UNLOAD Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.424000 audit: BPF prog-id=86 op=LOAD Dec 13 13:57:42.425000 audit: BPF prog-id=59 op=UNLOAD Dec 13 13:57:42.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.425000 audit: BPF prog-id=87 op=LOAD Dec 13 13:57:42.425000 audit: BPF prog-id=44 op=UNLOAD Dec 13 13:57:42.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.426000 audit: BPF prog-id=88 op=LOAD Dec 13 13:57:42.426000 audit: BPF prog-id=45 op=UNLOAD Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit: BPF prog-id=89 op=LOAD Dec 13 13:57:42.427000 audit: BPF prog-id=67 op=UNLOAD Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.427000 audit: BPF prog-id=90 op=LOAD Dec 13 13:57:42.427000 audit: BPF prog-id=46 op=UNLOAD Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit: BPF prog-id=91 op=LOAD Dec 13 13:57:42.429000 audit: BPF prog-id=63 op=UNLOAD Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.429000 audit: BPF prog-id=92 op=LOAD Dec 13 13:57:42.429000 audit: BPF prog-id=47 op=UNLOAD Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit: BPF prog-id=93 op=LOAD Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit: BPF prog-id=94 op=LOAD Dec 13 13:57:42.430000 audit: BPF prog-id=48 op=UNLOAD Dec 13 13:57:42.430000 audit: BPF prog-id=49 op=UNLOAD Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit: BPF prog-id=95 op=LOAD Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.430000 audit: BPF prog-id=96 op=LOAD Dec 13 13:57:42.430000 audit: BPF prog-id=50 op=UNLOAD Dec 13 13:57:42.430000 audit: BPF prog-id=51 op=UNLOAD Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit: BPF prog-id=97 op=LOAD Dec 13 13:57:42.431000 audit: BPF prog-id=52 op=UNLOAD Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit: BPF prog-id=98 op=LOAD Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.432000 audit: BPF prog-id=99 op=LOAD Dec 13 13:57:42.432000 audit: BPF prog-id=53 op=UNLOAD Dec 13 13:57:42.432000 audit: BPF prog-id=54 op=UNLOAD Dec 13 13:57:42.443667 systemd[1]: Stopping kubelet.service... Dec 13 13:57:42.465766 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 13:57:42.465942 systemd[1]: Stopped kubelet.service. Dec 13 13:57:42.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:42.465992 systemd[1]: kubelet.service: Consumed 1.447s CPU time. Dec 13 13:57:42.467484 systemd[1]: Starting kubelet.service... Dec 13 13:57:42.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:42.546596 systemd[1]: Started kubelet.service. Dec 13 13:57:42.635901 kubelet[2074]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 13:57:42.635901 kubelet[2074]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 13:57:42.635901 kubelet[2074]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 13:57:42.636401 kubelet[2074]: I1213 13:57:42.636287 2074 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 13:57:42.640886 kubelet[2074]: I1213 13:57:42.640861 2074 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 13:57:42.640886 kubelet[2074]: I1213 13:57:42.640887 2074 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 13:57:42.641120 kubelet[2074]: I1213 13:57:42.641104 2074 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 13:57:42.642627 kubelet[2074]: I1213 13:57:42.642569 2074 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 13:57:42.647505 kubelet[2074]: I1213 13:57:42.647471 2074 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 13:57:42.654295 kubelet[2074]: I1213 13:57:42.654269 2074 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 13:57:42.654569 kubelet[2074]: I1213 13:57:42.654545 2074 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 13:57:42.654808 kubelet[2074]: I1213 13:57:42.654778 2074 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 13:57:42.654889 kubelet[2074]: I1213 13:57:42.654811 2074 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 13:57:42.654889 kubelet[2074]: I1213 13:57:42.654821 2074 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 13:57:42.654889 kubelet[2074]: I1213 13:57:42.654850 2074 state_mem.go:36] "Initialized new in-memory state store" Dec 13 13:57:42.654958 kubelet[2074]: I1213 13:57:42.654932 2074 kubelet.go:396] "Attempting to sync node with API server" Dec 13 13:57:42.654958 kubelet[2074]: I1213 13:57:42.654948 2074 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 13:57:42.654997 kubelet[2074]: I1213 13:57:42.654967 2074 kubelet.go:312] "Adding apiserver pod source" Dec 13 13:57:42.654997 kubelet[2074]: I1213 13:57:42.654979 2074 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 13:57:42.656000 audit[2074]: AVC avc: denied { mac_admin } for pid=2074 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.656000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 13:57:42.656000 audit[2074]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40006feb40 a1=4000a838d8 a2=40006feb10 a3=25 items=0 ppid=1 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:42.656000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 13:57:42.656000 audit[2074]: AVC avc: denied { mac_admin } for pid=2074 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.656000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 13:57:42.656000 audit[2074]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009ec0c0 a1=4000a838f0 a2=40006febd0 a3=25 items=0 ppid=1 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:42.656000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 13:57:42.665820 kubelet[2074]: I1213 13:57:42.655915 2074 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 13:57:42.665820 kubelet[2074]: I1213 13:57:42.656072 2074 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 13:57:42.665820 kubelet[2074]: I1213 13:57:42.656518 2074 server.go:1256] "Started kubelet" Dec 13 13:57:42.665820 kubelet[2074]: I1213 13:57:42.658079 2074 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 13:57:42.665820 kubelet[2074]: I1213 13:57:42.658111 2074 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 13:57:42.665820 kubelet[2074]: I1213 13:57:42.658138 2074 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 13:57:42.665820 kubelet[2074]: I1213 13:57:42.659675 2074 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 13:57:42.665820 kubelet[2074]: I1213 13:57:42.660572 2074 server.go:461] "Adding debug handlers to kubelet server" Dec 13 13:57:42.665820 kubelet[2074]: I1213 13:57:42.661577 2074 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 13:57:42.665820 kubelet[2074]: I1213 13:57:42.661725 2074 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 13:57:42.665820 kubelet[2074]: I1213 13:57:42.661795 2074 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 13:57:42.665820 kubelet[2074]: I1213 13:57:42.661876 2074 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 13:57:42.665820 kubelet[2074]: I1213 13:57:42.661991 2074 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 13:57:42.665820 kubelet[2074]: E1213 13:57:42.662519 2074 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 13:57:42.667250 kubelet[2074]: I1213 13:57:42.667224 2074 factory.go:221] Registration of the systemd container factory successfully Dec 13 13:57:42.667409 kubelet[2074]: I1213 13:57:42.667391 2074 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 13:57:42.684203 kubelet[2074]: I1213 13:57:42.684157 2074 factory.go:221] Registration of the containerd container factory successfully Dec 13 13:57:42.695425 kubelet[2074]: E1213 13:57:42.695398 2074 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 13:57:42.695626 kubelet[2074]: I1213 13:57:42.695609 2074 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 13:57:42.698198 kubelet[2074]: I1213 13:57:42.697925 2074 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 13:57:42.698198 kubelet[2074]: I1213 13:57:42.697988 2074 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 13:57:42.698198 kubelet[2074]: I1213 13:57:42.698009 2074 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 13:57:42.698198 kubelet[2074]: E1213 13:57:42.698175 2074 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 13:57:42.720130 kubelet[2074]: I1213 13:57:42.720105 2074 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 13:57:42.720130 kubelet[2074]: I1213 13:57:42.720130 2074 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 13:57:42.720260 kubelet[2074]: I1213 13:57:42.720165 2074 state_mem.go:36] "Initialized new in-memory state store" Dec 13 13:57:42.720379 kubelet[2074]: I1213 13:57:42.720307 2074 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 13:57:42.720379 kubelet[2074]: I1213 13:57:42.720342 2074 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 13:57:42.720379 kubelet[2074]: I1213 13:57:42.720351 2074 policy_none.go:49] "None policy: Start" Dec 13 13:57:42.721011 kubelet[2074]: I1213 13:57:42.720994 2074 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 13:57:42.721105 kubelet[2074]: I1213 13:57:42.721093 2074 state_mem.go:35] "Initializing new in-memory state store" Dec 13 13:57:42.721295 kubelet[2074]: I1213 13:57:42.721280 2074 state_mem.go:75] "Updated machine memory state" Dec 13 13:57:42.724802 kubelet[2074]: I1213 13:57:42.724765 2074 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 13:57:42.723000 audit[2074]: AVC avc: denied { mac_admin } for pid=2074 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:42.723000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 13:57:42.723000 audit[2074]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ec2f60 a1=4001194a08 a2=4000ec2f30 a3=25 items=0 ppid=1 pid=2074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:42.723000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 13:57:42.725072 kubelet[2074]: I1213 13:57:42.724831 2074 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 13:57:42.725072 kubelet[2074]: I1213 13:57:42.725007 2074 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 13:57:42.767049 kubelet[2074]: I1213 13:57:42.767026 2074 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 13:57:42.777133 kubelet[2074]: I1213 13:57:42.777058 2074 kubelet_node_status.go:112] "Node was previously registered" node="localhost" Dec 13 13:57:42.777235 kubelet[2074]: I1213 13:57:42.777130 2074 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 13:57:42.799073 kubelet[2074]: I1213 13:57:42.798970 2074 topology_manager.go:215] "Topology Admit Handler" podUID="c4144e8f85b2123a6afada0c1705bbba" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 13:57:42.799073 kubelet[2074]: I1213 13:57:42.799045 2074 topology_manager.go:215] "Topology Admit Handler" podUID="938802e490bfb06a072a9fb95f7475d8" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 13:57:42.799184 kubelet[2074]: I1213 13:57:42.799101 2074 topology_manager.go:215] "Topology Admit Handler" podUID="4f8e0d694c07e04969646aa3c152c34a" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 13:57:42.806032 kubelet[2074]: E1213 13:57:42.806002 2074 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Dec 13 13:57:42.863719 kubelet[2074]: I1213 13:57:42.862305 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 13:57:42.863719 kubelet[2074]: I1213 13:57:42.862343 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/938802e490bfb06a072a9fb95f7475d8-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"938802e490bfb06a072a9fb95f7475d8\") " pod="kube-system/kube-apiserver-localhost" Dec 13 13:57:42.863719 kubelet[2074]: I1213 13:57:42.862384 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 13:57:42.863719 kubelet[2074]: I1213 13:57:42.862410 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 13:57:42.863719 kubelet[2074]: I1213 13:57:42.862428 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 13:57:42.863913 kubelet[2074]: I1213 13:57:42.862465 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 13:57:42.863913 kubelet[2074]: I1213 13:57:42.862487 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c4144e8f85b2123a6afada0c1705bbba-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"c4144e8f85b2123a6afada0c1705bbba\") " pod="kube-system/kube-scheduler-localhost" Dec 13 13:57:42.863913 kubelet[2074]: I1213 13:57:42.862509 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/938802e490bfb06a072a9fb95f7475d8-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"938802e490bfb06a072a9fb95f7475d8\") " pod="kube-system/kube-apiserver-localhost" Dec 13 13:57:42.863913 kubelet[2074]: I1213 13:57:42.862529 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/938802e490bfb06a072a9fb95f7475d8-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"938802e490bfb06a072a9fb95f7475d8\") " pod="kube-system/kube-apiserver-localhost" Dec 13 13:57:43.104582 kubelet[2074]: E1213 13:57:43.104476 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:43.106075 kubelet[2074]: E1213 13:57:43.106050 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:43.107290 kubelet[2074]: E1213 13:57:43.107268 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:43.589000 audit[1959]: AVC avc: denied { watch } for pid=1959 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:57:43.589000 audit[1959]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000eac080 a2=fc6 a3=0 items=0 ppid=1784 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 key=(null) Dec 13 13:57:43.589000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 13:57:43.589000 audit[1959]: AVC avc: denied { watch } for pid=1959 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:57:43.589000 audit[1959]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000eac100 a2=fc6 a3=0 items=0 ppid=1784 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 key=(null) Dec 13 13:57:43.589000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 13:57:43.589000 audit[1959]: AVC avc: denied { watch } for pid=1959 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:57:43.589000 audit[1959]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001128820 a2=fc6 a3=0 items=0 ppid=1784 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 key=(null) Dec 13 13:57:43.589000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 13:57:43.590000 audit[1959]: AVC avc: denied { watch } for pid=1959 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:57:43.590000 audit[1959]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000eac440 a2=fc6 a3=0 items=0 ppid=1784 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 key=(null) Dec 13 13:57:43.590000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 13:57:43.655652 kubelet[2074]: I1213 13:57:43.655606 2074 apiserver.go:52] "Watching apiserver" Dec 13 13:57:43.662467 kubelet[2074]: I1213 13:57:43.662423 2074 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 13:57:43.709474 kubelet[2074]: E1213 13:57:43.706508 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:43.709474 kubelet[2074]: E1213 13:57:43.707443 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:43.713679 kubelet[2074]: E1213 13:57:43.713657 2074 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Dec 13 13:57:43.714234 kubelet[2074]: E1213 13:57:43.714218 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:43.719887 kubelet[2074]: I1213 13:57:43.719857 2074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.719820177 podStartE2EDuration="1.719820177s" podCreationTimestamp="2024-12-13 13:57:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 13:57:43.712407739 +0000 UTC m=+1.158364958" watchObservedRunningTime="2024-12-13 13:57:43.719820177 +0000 UTC m=+1.165777396" Dec 13 13:57:43.727069 kubelet[2074]: I1213 13:57:43.727041 2074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.72700952 podStartE2EDuration="1.72700952s" podCreationTimestamp="2024-12-13 13:57:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 13:57:43.719973189 +0000 UTC m=+1.165930408" watchObservedRunningTime="2024-12-13 13:57:43.72700952 +0000 UTC m=+1.172966739" Dec 13 13:57:43.737942 kubelet[2074]: I1213 13:57:43.737911 2074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.737879446 podStartE2EDuration="2.737879446s" podCreationTimestamp="2024-12-13 13:57:41 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 13:57:43.729396362 +0000 UTC m=+1.175353581" watchObservedRunningTime="2024-12-13 13:57:43.737879446 +0000 UTC m=+1.183836625" Dec 13 13:57:44.387000 audit[1959]: AVC avc: denied { watch } for pid=1959 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 13:57:44.392380 kernel: kauditd_printk_skb: 284 callbacks suppressed Dec 13 13:57:44.392466 kernel: audit: type=1400 audit(1734098264.387:805): avc: denied { watch } for pid=1959 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 13:57:44.387000 audit[1959]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000fb7200 a2=fc6 a3=0 items=0 ppid=1784 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 key=(null) Dec 13 13:57:44.396483 kernel: audit: type=1300 audit(1734098264.387:805): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000fb7200 a2=fc6 a3=0 items=0 ppid=1784 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 key=(null) Dec 13 13:57:44.387000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 13:57:44.399877 kernel: audit: type=1327 audit(1734098264.387:805): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 13:57:44.707589 kubelet[2074]: E1213 13:57:44.707492 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:44.707891 kubelet[2074]: E1213 13:57:44.707700 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:46.587960 sudo[1359]: pam_unix(sudo:session): session closed for user root Dec 13 13:57:46.587000 audit[1359]: USER_END pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:57:46.587000 audit[1359]: CRED_DISP pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:57:46.591847 sshd[1355]: pam_unix(sshd:session): session closed for user core Dec 13 13:57:46.594349 kernel: audit: type=1106 audit(1734098266.587:806): pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:57:46.594404 kernel: audit: type=1104 audit(1734098266.587:807): pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:57:46.594000 audit[1355]: USER_END pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:57:46.596677 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 13:57:46.596860 systemd[1]: session-7.scope: Consumed 6.545s CPU time. Dec 13 13:57:46.597272 systemd[1]: sshd@6-10.0.0.25:22-10.0.0.1:60458.service: Deactivated successfully. Dec 13 13:57:46.598847 kernel: audit: type=1106 audit(1734098266.594:808): pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:57:46.594000 audit[1355]: CRED_DISP pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:57:46.602032 kernel: audit: type=1104 audit(1734098266.594:809): pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:57:46.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.25:22-10.0.0.1:60458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:46.602188 systemd-logind[1210]: Session 7 logged out. Waiting for processes to exit. Dec 13 13:57:46.604937 kernel: audit: type=1131 audit(1734098266.594:810): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.25:22-10.0.0.1:60458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:46.605416 systemd-logind[1210]: Removed session 7. Dec 13 13:57:48.684921 kubelet[2074]: E1213 13:57:48.684884 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:48.714166 kubelet[2074]: E1213 13:57:48.713977 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:49.987796 kubelet[2074]: E1213 13:57:49.987761 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:50.717338 kubelet[2074]: E1213 13:57:50.717300 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:53.700503 kubelet[2074]: E1213 13:57:53.700472 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:55.957139 kubelet[2074]: I1213 13:57:55.957079 2074 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 13:57:55.957971 env[1222]: time="2024-12-13T13:57:55.957811813Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 13:57:55.958541 kubelet[2074]: I1213 13:57:55.958512 2074 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 13:57:56.569186 kubelet[2074]: I1213 13:57:56.569141 2074 topology_manager.go:215] "Topology Admit Handler" podUID="cc7b7f20-6490-46e9-8f29-08215562a8be" podNamespace="kube-system" podName="kube-proxy-hvk65" Dec 13 13:57:56.588347 systemd[1]: Created slice kubepods-besteffort-podcc7b7f20_6490_46e9_8f29_08215562a8be.slice. Dec 13 13:57:56.759070 kubelet[2074]: I1213 13:57:56.758982 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/cc7b7f20-6490-46e9-8f29-08215562a8be-kube-proxy\") pod \"kube-proxy-hvk65\" (UID: \"cc7b7f20-6490-46e9-8f29-08215562a8be\") " pod="kube-system/kube-proxy-hvk65" Dec 13 13:57:56.759070 kubelet[2074]: I1213 13:57:56.759054 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2nblf\" (UniqueName: \"kubernetes.io/projected/cc7b7f20-6490-46e9-8f29-08215562a8be-kube-api-access-2nblf\") pod \"kube-proxy-hvk65\" (UID: \"cc7b7f20-6490-46e9-8f29-08215562a8be\") " pod="kube-system/kube-proxy-hvk65" Dec 13 13:57:56.759242 kubelet[2074]: I1213 13:57:56.759091 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cc7b7f20-6490-46e9-8f29-08215562a8be-xtables-lock\") pod \"kube-proxy-hvk65\" (UID: \"cc7b7f20-6490-46e9-8f29-08215562a8be\") " pod="kube-system/kube-proxy-hvk65" Dec 13 13:57:56.759242 kubelet[2074]: I1213 13:57:56.759115 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cc7b7f20-6490-46e9-8f29-08215562a8be-lib-modules\") pod \"kube-proxy-hvk65\" (UID: \"cc7b7f20-6490-46e9-8f29-08215562a8be\") " pod="kube-system/kube-proxy-hvk65" Dec 13 13:57:56.902385 kubelet[2074]: E1213 13:57:56.902287 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:56.903412 env[1222]: time="2024-12-13T13:57:56.903328450Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hvk65,Uid:cc7b7f20-6490-46e9-8f29-08215562a8be,Namespace:kube-system,Attempt:0,}" Dec 13 13:57:56.921130 env[1222]: time="2024-12-13T13:57:56.920324638Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:57:56.921130 env[1222]: time="2024-12-13T13:57:56.920371452Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:57:56.921130 env[1222]: time="2024-12-13T13:57:56.920382535Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:57:56.921130 env[1222]: time="2024-12-13T13:57:56.920562390Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bba7edb601a2612b9d91fec7cd86aa3c85e3eaf79ef45d04aeb9d4cdf1806f64 pid=2170 runtime=io.containerd.runc.v2 Dec 13 13:57:56.935784 systemd[1]: Started cri-containerd-bba7edb601a2612b9d91fec7cd86aa3c85e3eaf79ef45d04aeb9d4cdf1806f64.scope. Dec 13 13:57:56.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968083 kernel: audit: type=1400 audit(1734098276.962:811): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968172 kernel: audit: type=1400 audit(1734098276.962:812): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.972404 kernel: audit: type=1400 audit(1734098276.962:813): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.972495 kernel: audit: type=1400 audit(1734098276.962:814): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.975550 update_engine[1211]: I1213 13:57:56.975468 1211 update_attempter.cc:509] Updating boot flags... Dec 13 13:57:56.978046 kernel: audit: type=1400 audit(1734098276.962:815): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.981523 kernel: audit: type=1400 audit(1734098276.962:816): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.984445 kernel: audit: type=1400 audit(1734098276.962:817): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.988092 kernel: audit: type=1400 audit(1734098276.962:818): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.997484 kernel: audit: type=1400 audit(1734098276.962:819): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.997558 kernel: audit: type=1400 audit(1734098276.964:820): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.998223 kubelet[2074]: I1213 13:57:56.998184 2074 topology_manager.go:215] "Topology Admit Handler" podUID="95fb2277-56f1-41d2-8efd-76e598c9beff" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-k72v7" Dec 13 13:57:56.964000 audit: BPF prog-id=100 op=LOAD Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2170 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:56.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262613765646236303161323631326239643931666563376364383661 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2170 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:56.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262613765646236303161323631326239643931666563376364383661 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit: BPF prog-id=101 op=LOAD Dec 13 13:57:56.968000 audit[2180]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2170 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:56.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262613765646236303161323631326239643931666563376364383661 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit: BPF prog-id=102 op=LOAD Dec 13 13:57:56.968000 audit[2180]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2170 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:56.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262613765646236303161323631326239643931666563376364383661 Dec 13 13:57:56.968000 audit: BPF prog-id=102 op=UNLOAD Dec 13 13:57:56.968000 audit: BPF prog-id=101 op=UNLOAD Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { perfmon } for pid=2180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit[2180]: AVC avc: denied { bpf } for pid=2180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:56.968000 audit: BPF prog-id=103 op=LOAD Dec 13 13:57:56.968000 audit[2180]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2170 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:56.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262613765646236303161323631326239643931666563376364383661 Dec 13 13:57:57.006523 systemd[1]: Created slice kubepods-besteffort-pod95fb2277_56f1_41d2_8efd_76e598c9beff.slice. Dec 13 13:57:57.025941 env[1222]: time="2024-12-13T13:57:57.025560380Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hvk65,Uid:cc7b7f20-6490-46e9-8f29-08215562a8be,Namespace:kube-system,Attempt:0,} returns sandbox id \"bba7edb601a2612b9d91fec7cd86aa3c85e3eaf79ef45d04aeb9d4cdf1806f64\"" Dec 13 13:57:57.026307 kubelet[2074]: E1213 13:57:57.026279 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:57.029796 env[1222]: time="2024-12-13T13:57:57.029119493Z" level=info msg="CreateContainer within sandbox \"bba7edb601a2612b9d91fec7cd86aa3c85e3eaf79ef45d04aeb9d4cdf1806f64\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 13:57:57.052916 env[1222]: time="2024-12-13T13:57:57.052858542Z" level=info msg="CreateContainer within sandbox \"bba7edb601a2612b9d91fec7cd86aa3c85e3eaf79ef45d04aeb9d4cdf1806f64\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"614d23bd9b2f015493ec49dcb64aa01d508ed7138bc46e3be5d180abcb1e8c1a\"" Dec 13 13:57:57.053914 env[1222]: time="2024-12-13T13:57:57.053871356Z" level=info msg="StartContainer for \"614d23bd9b2f015493ec49dcb64aa01d508ed7138bc46e3be5d180abcb1e8c1a\"" Dec 13 13:57:57.087285 systemd[1]: Started cri-containerd-614d23bd9b2f015493ec49dcb64aa01d508ed7138bc46e3be5d180abcb1e8c1a.scope. Dec 13 13:57:57.115000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.115000 audit[2223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2170 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631346432336264396232663031353439336563343964636236346161 Dec 13 13:57:57.115000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.115000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.115000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.115000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.115000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.115000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.115000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.115000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.115000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.115000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.115000 audit: BPF prog-id=104 op=LOAD Dec 13 13:57:57.115000 audit[2223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2170 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631346432336264396232663031353439336563343964636236346161 Dec 13 13:57:57.116000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.116000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.116000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.116000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.116000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.116000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.116000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.116000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.116000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.116000 audit: BPF prog-id=105 op=LOAD Dec 13 13:57:57.116000 audit[2223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2170 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631346432336264396232663031353439336563343964636236346161 Dec 13 13:57:57.117000 audit: BPF prog-id=105 op=UNLOAD Dec 13 13:57:57.117000 audit: BPF prog-id=104 op=UNLOAD Dec 13 13:57:57.117000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.117000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.117000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.117000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.117000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.117000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.117000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.117000 audit[2223]: AVC avc: denied { perfmon } for pid=2223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.117000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.117000 audit[2223]: AVC avc: denied { bpf } for pid=2223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.117000 audit: BPF prog-id=106 op=LOAD Dec 13 13:57:57.117000 audit[2223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2170 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631346432336264396232663031353439336563343964636236346161 Dec 13 13:57:57.134085 env[1222]: time="2024-12-13T13:57:57.134038261Z" level=info msg="StartContainer for \"614d23bd9b2f015493ec49dcb64aa01d508ed7138bc46e3be5d180abcb1e8c1a\" returns successfully" Dec 13 13:57:57.162528 kubelet[2074]: I1213 13:57:57.162415 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9f6r5\" (UniqueName: \"kubernetes.io/projected/95fb2277-56f1-41d2-8efd-76e598c9beff-kube-api-access-9f6r5\") pod \"tigera-operator-c7ccbd65-k72v7\" (UID: \"95fb2277-56f1-41d2-8efd-76e598c9beff\") " pod="tigera-operator/tigera-operator-c7ccbd65-k72v7" Dec 13 13:57:57.162528 kubelet[2074]: I1213 13:57:57.162479 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/95fb2277-56f1-41d2-8efd-76e598c9beff-var-lib-calico\") pod \"tigera-operator-c7ccbd65-k72v7\" (UID: \"95fb2277-56f1-41d2-8efd-76e598c9beff\") " pod="tigera-operator/tigera-operator-c7ccbd65-k72v7" Dec 13 13:57:57.267000 audit[2277]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.267000 audit[2277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcbe9a3a0 a2=0 a3=1 items=0 ppid=2234 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 13:57:57.271000 audit[2278]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.271000 audit[2278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd0776e60 a2=0 a3=1 items=0 ppid=2234 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 13:57:57.272000 audit[2280]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.272000 audit[2280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc487ea80 a2=0 a3=1 items=0 ppid=2234 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.272000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 13:57:57.273000 audit[2279]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.273000 audit[2279]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff003f7c0 a2=0 a3=1 items=0 ppid=2234 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 13:57:57.274000 audit[2282]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.274000 audit[2282]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffde7f28a0 a2=0 a3=1 items=0 ppid=2234 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.274000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 13:57:57.274000 audit[2283]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.274000 audit[2283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe1831250 a2=0 a3=1 items=0 ppid=2234 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.274000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 13:57:57.312354 env[1222]: time="2024-12-13T13:57:57.312307155Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-k72v7,Uid:95fb2277-56f1-41d2-8efd-76e598c9beff,Namespace:tigera-operator,Attempt:0,}" Dec 13 13:57:57.332586 env[1222]: time="2024-12-13T13:57:57.332505097Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:57:57.332586 env[1222]: time="2024-12-13T13:57:57.332543068Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:57:57.332586 env[1222]: time="2024-12-13T13:57:57.332553431Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:57:57.332968 env[1222]: time="2024-12-13T13:57:57.332916656Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/17ebc9a339a9f6a89384acf45aaad77c03ad98ef8638fa11677bb0d2d1a4f149 pid=2292 runtime=io.containerd.runc.v2 Dec 13 13:57:57.344231 systemd[1]: Started cri-containerd-17ebc9a339a9f6a89384acf45aaad77c03ad98ef8638fa11677bb0d2d1a4f149.scope. Dec 13 13:57:57.370000 audit[2319]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.370000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd184d130 a2=0 a3=1 items=0 ppid=2234 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 13:57:57.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit: BPF prog-id=107 op=LOAD Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[2302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2292 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137656263396133333961396636613839333834616366343561616164 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[2302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2292 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137656263396133333961396636613839333834616366343561616164 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit: BPF prog-id=108 op=LOAD Dec 13 13:57:57.374000 audit[2302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2292 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137656263396133333961396636613839333834616366343561616164 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.374000 audit: BPF prog-id=109 op=LOAD Dec 13 13:57:57.374000 audit[2302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2292 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137656263396133333961396636613839333834616366343561616164 Dec 13 13:57:57.374000 audit: BPF prog-id=109 op=UNLOAD Dec 13 13:57:57.374000 audit: BPF prog-id=108 op=UNLOAD Dec 13 13:57:57.375000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.375000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.375000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.375000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.375000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.375000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.375000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.375000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.375000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.375000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:57.375000 audit: BPF prog-id=110 op=LOAD Dec 13 13:57:57.375000 audit[2302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2292 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137656263396133333961396636613839333834616366343561616164 Dec 13 13:57:57.378000 audit[2321]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.378000 audit[2321]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd06d7ae0 a2=0 a3=1 items=0 ppid=2234 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.378000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 13:57:57.385000 audit[2324]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.385000 audit[2324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc5ff03f0 a2=0 a3=1 items=0 ppid=2234 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 13:57:57.385000 audit[2325]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.385000 audit[2325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff36b2590 a2=0 a3=1 items=0 ppid=2234 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 13:57:57.391000 audit[2327]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.391000 audit[2327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe91b6670 a2=0 a3=1 items=0 ppid=2234 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.391000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 13:57:57.392000 audit[2330]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.392000 audit[2330]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc743330 a2=0 a3=1 items=0 ppid=2234 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.392000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 13:57:57.395000 audit[2337]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.395000 audit[2337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe4209ee0 a2=0 a3=1 items=0 ppid=2234 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.395000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 13:57:57.398000 audit[2340]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.398000 audit[2340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc73fafc0 a2=0 a3=1 items=0 ppid=2234 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.398000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 13:57:57.399000 audit[2341]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.399000 audit[2341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffebab2a60 a2=0 a3=1 items=0 ppid=2234 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.399000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 13:57:57.400581 env[1222]: time="2024-12-13T13:57:57.400542442Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-k72v7,Uid:95fb2277-56f1-41d2-8efd-76e598c9beff,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"17ebc9a339a9f6a89384acf45aaad77c03ad98ef8638fa11677bb0d2d1a4f149\"" Dec 13 13:57:57.403672 env[1222]: time="2024-12-13T13:57:57.403628537Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 13:57:57.403000 audit[2343]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.403000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff54433d0 a2=0 a3=1 items=0 ppid=2234 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.403000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 13:57:57.406000 audit[2344]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.406000 audit[2344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffa98efc0 a2=0 a3=1 items=0 ppid=2234 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.406000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 13:57:57.408000 audit[2346]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.408000 audit[2346]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff7714d20 a2=0 a3=1 items=0 ppid=2234 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.408000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 13:57:57.411000 audit[2349]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.411000 audit[2349]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffeb501920 a2=0 a3=1 items=0 ppid=2234 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 13:57:57.417000 audit[2352]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.417000 audit[2352]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff72bbb80 a2=0 a3=1 items=0 ppid=2234 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.417000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 13:57:57.418000 audit[2353]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.418000 audit[2353]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdcb2c900 a2=0 a3=1 items=0 ppid=2234 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 13:57:57.420000 audit[2355]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.420000 audit[2355]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffd099cb50 a2=0 a3=1 items=0 ppid=2234 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.420000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 13:57:57.424000 audit[2358]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.424000 audit[2358]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff3c1a050 a2=0 a3=1 items=0 ppid=2234 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 13:57:57.425000 audit[2359]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.425000 audit[2359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff72ca820 a2=0 a3=1 items=0 ppid=2234 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 13:57:57.427000 audit[2361]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:57:57.427000 audit[2361]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffca0bf0d0 a2=0 a3=1 items=0 ppid=2234 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 13:57:57.444000 audit[2367]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2367 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:57:57.444000 audit[2367]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffd0e9a570 a2=0 a3=1 items=0 ppid=2234 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.444000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:57:57.454000 audit[2367]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:57:57.454000 audit[2367]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffd0e9a570 a2=0 a3=1 items=0 ppid=2234 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.454000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:57:57.455000 audit[2371]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.455000 audit[2371]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffdd88b3b0 a2=0 a3=1 items=0 ppid=2234 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.455000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 13:57:57.457000 audit[2373]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.457000 audit[2373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff93b1af0 a2=0 a3=1 items=0 ppid=2234 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.457000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 13:57:57.461000 audit[2376]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.461000 audit[2376]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc1f8e560 a2=0 a3=1 items=0 ppid=2234 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.461000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 13:57:57.462000 audit[2377]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.462000 audit[2377]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffee9b3e70 a2=0 a3=1 items=0 ppid=2234 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.462000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 13:57:57.464000 audit[2379]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.464000 audit[2379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdba8dce0 a2=0 a3=1 items=0 ppid=2234 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.464000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 13:57:57.465000 audit[2380]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.465000 audit[2380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc3494710 a2=0 a3=1 items=0 ppid=2234 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.465000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 13:57:57.467000 audit[2382]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.467000 audit[2382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc36f6850 a2=0 a3=1 items=0 ppid=2234 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.467000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 13:57:57.471000 audit[2385]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.471000 audit[2385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffd23caba0 a2=0 a3=1 items=0 ppid=2234 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.471000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 13:57:57.472000 audit[2386]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.472000 audit[2386]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcc7241a0 a2=0 a3=1 items=0 ppid=2234 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.472000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 13:57:57.474000 audit[2388]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.474000 audit[2388]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe41578f0 a2=0 a3=1 items=0 ppid=2234 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.474000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 13:57:57.475000 audit[2389]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.475000 audit[2389]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff8565050 a2=0 a3=1 items=0 ppid=2234 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.475000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 13:57:57.477000 audit[2391]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.477000 audit[2391]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe9324b10 a2=0 a3=1 items=0 ppid=2234 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.477000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 13:57:57.480000 audit[2394]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.480000 audit[2394]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc8205f40 a2=0 a3=1 items=0 ppid=2234 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.480000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 13:57:57.484000 audit[2397]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.484000 audit[2397]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc3146ad0 a2=0 a3=1 items=0 ppid=2234 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.484000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 13:57:57.485000 audit[2398]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2398 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.485000 audit[2398]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffed4a4600 a2=0 a3=1 items=0 ppid=2234 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.485000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 13:57:57.487000 audit[2400]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.487000 audit[2400]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff1283340 a2=0 a3=1 items=0 ppid=2234 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.487000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 13:57:57.490000 audit[2403]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.490000 audit[2403]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc40b27f0 a2=0 a3=1 items=0 ppid=2234 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.490000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 13:57:57.491000 audit[2404]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.491000 audit[2404]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9dd6d90 a2=0 a3=1 items=0 ppid=2234 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.491000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 13:57:57.493000 audit[2406]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.493000 audit[2406]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc3a74660 a2=0 a3=1 items=0 ppid=2234 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.493000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 13:57:57.494000 audit[2407]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.494000 audit[2407]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffea09470 a2=0 a3=1 items=0 ppid=2234 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.494000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 13:57:57.497000 audit[2409]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2409 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.497000 audit[2409]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdca07970 a2=0 a3=1 items=0 ppid=2234 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.497000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 13:57:57.500000 audit[2412]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2412 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:57:57.500000 audit[2412]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffedbbaa50 a2=0 a3=1 items=0 ppid=2234 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.500000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 13:57:57.502000 audit[2414]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 13:57:57.502000 audit[2414]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=fffffa2a87f0 a2=0 a3=1 items=0 ppid=2234 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.502000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:57:57.503000 audit[2414]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 13:57:57.503000 audit[2414]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=fffffa2a87f0 a2=0 a3=1 items=0 ppid=2234 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:57.503000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:57:57.730371 kubelet[2074]: E1213 13:57:57.730291 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:57.740116 kubelet[2074]: I1213 13:57:57.739697 2074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-hvk65" podStartSLOduration=1.7396661770000001 podStartE2EDuration="1.739666177s" podCreationTimestamp="2024-12-13 13:57:56 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 13:57:57.738887951 +0000 UTC m=+15.184845170" watchObservedRunningTime="2024-12-13 13:57:57.739666177 +0000 UTC m=+15.185623396" Dec 13 13:57:57.876149 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2568552197.mount: Deactivated successfully. Dec 13 13:57:59.870960 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount376392789.mount: Deactivated successfully. Dec 13 13:58:00.413721 env[1222]: time="2024-12-13T13:58:00.413676526Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:00.416008 env[1222]: time="2024-12-13T13:58:00.415967900Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:30d521e4e84764b396aacbb2a373ca7a573f84571e3955b34329652acccfb73c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:00.417511 env[1222]: time="2024-12-13T13:58:00.417479719Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:00.419151 env[1222]: time="2024-12-13T13:58:00.419119050Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:00.419649 env[1222]: time="2024-12-13T13:58:00.419611853Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:30d521e4e84764b396aacbb2a373ca7a573f84571e3955b34329652acccfb73c\"" Dec 13 13:58:00.421655 env[1222]: time="2024-12-13T13:58:00.421606113Z" level=info msg="CreateContainer within sandbox \"17ebc9a339a9f6a89384acf45aaad77c03ad98ef8638fa11677bb0d2d1a4f149\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 13:58:00.430600 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount300380628.mount: Deactivated successfully. Dec 13 13:58:00.435407 env[1222]: time="2024-12-13T13:58:00.435362320Z" level=info msg="CreateContainer within sandbox \"17ebc9a339a9f6a89384acf45aaad77c03ad98ef8638fa11677bb0d2d1a4f149\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"337ec3c50f19da019eb87563202807b5d375526590fd6c2ff7c682852816c7ff\"" Dec 13 13:58:00.436041 env[1222]: time="2024-12-13T13:58:00.436011723Z" level=info msg="StartContainer for \"337ec3c50f19da019eb87563202807b5d375526590fd6c2ff7c682852816c7ff\"" Dec 13 13:58:00.453923 systemd[1]: Started cri-containerd-337ec3c50f19da019eb87563202807b5d375526590fd6c2ff7c682852816c7ff.scope. Dec 13 13:58:00.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.480000 audit: BPF prog-id=111 op=LOAD Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2292 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:00.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333376563336335306631396461303139656238373536333230323830 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2292 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:00.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333376563336335306631396461303139656238373536333230323830 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit: BPF prog-id=112 op=LOAD Dec 13 13:58:00.481000 audit[2422]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2292 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:00.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333376563336335306631396461303139656238373536333230323830 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit: BPF prog-id=113 op=LOAD Dec 13 13:58:00.481000 audit[2422]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2292 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:00.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333376563336335306631396461303139656238373536333230323830 Dec 13 13:58:00.481000 audit: BPF prog-id=113 op=UNLOAD Dec 13 13:58:00.481000 audit: BPF prog-id=112 op=UNLOAD Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { perfmon } for pid=2422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit[2422]: AVC avc: denied { bpf } for pid=2422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:00.481000 audit: BPF prog-id=114 op=LOAD Dec 13 13:58:00.481000 audit[2422]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2292 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:00.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333376563336335306631396461303139656238373536333230323830 Dec 13 13:58:00.497371 env[1222]: time="2024-12-13T13:58:00.497327488Z" level=info msg="StartContainer for \"337ec3c50f19da019eb87563202807b5d375526590fd6c2ff7c682852816c7ff\" returns successfully" Dec 13 13:58:00.749310 kubelet[2074]: I1213 13:58:00.747821 2074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-k72v7" podStartSLOduration=1.729101298 podStartE2EDuration="4.747783331s" podCreationTimestamp="2024-12-13 13:57:56 +0000 UTC" firstStartedPulling="2024-12-13 13:57:57.401580623 +0000 UTC m=+14.847537842" lastFinishedPulling="2024-12-13 13:58:00.420262656 +0000 UTC m=+17.866219875" observedRunningTime="2024-12-13 13:58:00.747611728 +0000 UTC m=+18.193568907" watchObservedRunningTime="2024-12-13 13:58:00.747783331 +0000 UTC m=+18.193740550" Dec 13 13:58:00.837167 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3116306650.mount: Deactivated successfully. Dec 13 13:58:04.010000 audit[2456]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2456 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:04.013029 kernel: kauditd_printk_skb: 357 callbacks suppressed Dec 13 13:58:04.013134 kernel: audit: type=1325 audit(1734098284.010:922): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2456 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:04.010000 audit[2456]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffdd7bbc60 a2=0 a3=1 items=0 ppid=2234 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:04.010000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:04.022246 kernel: audit: type=1300 audit(1734098284.010:922): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffdd7bbc60 a2=0 a3=1 items=0 ppid=2234 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:04.022326 kernel: audit: type=1327 audit(1734098284.010:922): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:04.029000 audit[2456]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2456 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:04.029000 audit[2456]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffdd7bbc60 a2=0 a3=1 items=0 ppid=2234 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:04.036424 kernel: audit: type=1325 audit(1734098284.029:923): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2456 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:04.036535 kernel: audit: type=1300 audit(1734098284.029:923): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffdd7bbc60 a2=0 a3=1 items=0 ppid=2234 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:04.029000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:04.038531 kernel: audit: type=1327 audit(1734098284.029:923): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:04.055000 audit[2458]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2458 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:04.055000 audit[2458]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff7c5e340 a2=0 a3=1 items=0 ppid=2234 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:04.063476 kernel: audit: type=1325 audit(1734098284.055:924): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2458 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:04.063579 kernel: audit: type=1300 audit(1734098284.055:924): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff7c5e340 a2=0 a3=1 items=0 ppid=2234 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:04.055000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:04.070468 kernel: audit: type=1327 audit(1734098284.055:924): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:04.070000 audit[2458]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2458 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:04.070000 audit[2458]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff7c5e340 a2=0 a3=1 items=0 ppid=2234 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:04.070000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:04.073464 kernel: audit: type=1325 audit(1734098284.070:925): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2458 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:04.145830 kubelet[2074]: I1213 13:58:04.145794 2074 topology_manager.go:215] "Topology Admit Handler" podUID="dfde137c-93b7-4df9-b9da-42e30c030adc" podNamespace="calico-system" podName="calico-typha-66c5465794-6jggk" Dec 13 13:58:04.150301 systemd[1]: Created slice kubepods-besteffort-poddfde137c_93b7_4df9_b9da_42e30c030adc.slice. Dec 13 13:58:04.193907 kubelet[2074]: I1213 13:58:04.193866 2074 topology_manager.go:215] "Topology Admit Handler" podUID="b48baafb-9fea-4925-9d77-083a8f796626" podNamespace="calico-system" podName="calico-node-pq55v" Dec 13 13:58:04.198822 systemd[1]: Created slice kubepods-besteffort-podb48baafb_9fea_4925_9d77_083a8f796626.slice. Dec 13 13:58:04.300868 kubelet[2074]: I1213 13:58:04.300822 2074 topology_manager.go:215] "Topology Admit Handler" podUID="5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa" podNamespace="calico-system" podName="csi-node-driver-674z4" Dec 13 13:58:04.301507 kubelet[2074]: E1213 13:58:04.301484 2074 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-674z4" podUID="5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa" Dec 13 13:58:04.317512 kubelet[2074]: I1213 13:58:04.317485 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b48baafb-9fea-4925-9d77-083a8f796626-flexvol-driver-host\") pod \"calico-node-pq55v\" (UID: \"b48baafb-9fea-4925-9d77-083a8f796626\") " pod="calico-system/calico-node-pq55v" Dec 13 13:58:04.317835 kubelet[2074]: I1213 13:58:04.317779 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9dfwm\" (UniqueName: \"kubernetes.io/projected/b48baafb-9fea-4925-9d77-083a8f796626-kube-api-access-9dfwm\") pod \"calico-node-pq55v\" (UID: \"b48baafb-9fea-4925-9d77-083a8f796626\") " pod="calico-system/calico-node-pq55v" Dec 13 13:58:04.317976 kubelet[2074]: I1213 13:58:04.317959 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b48baafb-9fea-4925-9d77-083a8f796626-xtables-lock\") pod \"calico-node-pq55v\" (UID: \"b48baafb-9fea-4925-9d77-083a8f796626\") " pod="calico-system/calico-node-pq55v" Dec 13 13:58:04.318110 kubelet[2074]: I1213 13:58:04.318086 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b48baafb-9fea-4925-9d77-083a8f796626-tigera-ca-bundle\") pod \"calico-node-pq55v\" (UID: \"b48baafb-9fea-4925-9d77-083a8f796626\") " pod="calico-system/calico-node-pq55v" Dec 13 13:58:04.318158 kubelet[2074]: I1213 13:58:04.318137 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b48baafb-9fea-4925-9d77-083a8f796626-var-run-calico\") pod \"calico-node-pq55v\" (UID: \"b48baafb-9fea-4925-9d77-083a8f796626\") " pod="calico-system/calico-node-pq55v" Dec 13 13:58:04.318189 kubelet[2074]: I1213 13:58:04.318182 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa-varrun\") pod \"csi-node-driver-674z4\" (UID: \"5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa\") " pod="calico-system/csi-node-driver-674z4" Dec 13 13:58:04.318213 kubelet[2074]: I1213 13:58:04.318209 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/dfde137c-93b7-4df9-b9da-42e30c030adc-typha-certs\") pod \"calico-typha-66c5465794-6jggk\" (UID: \"dfde137c-93b7-4df9-b9da-42e30c030adc\") " pod="calico-system/calico-typha-66c5465794-6jggk" Dec 13 13:58:04.318237 kubelet[2074]: I1213 13:58:04.318231 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b48baafb-9fea-4925-9d77-083a8f796626-cni-bin-dir\") pod \"calico-node-pq55v\" (UID: \"b48baafb-9fea-4925-9d77-083a8f796626\") " pod="calico-system/calico-node-pq55v" Dec 13 13:58:04.318261 kubelet[2074]: I1213 13:58:04.318251 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2hlzq\" (UniqueName: \"kubernetes.io/projected/5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa-kube-api-access-2hlzq\") pod \"csi-node-driver-674z4\" (UID: \"5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa\") " pod="calico-system/csi-node-driver-674z4" Dec 13 13:58:04.318287 kubelet[2074]: I1213 13:58:04.318276 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa-registration-dir\") pod \"csi-node-driver-674z4\" (UID: \"5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa\") " pod="calico-system/csi-node-driver-674z4" Dec 13 13:58:04.318310 kubelet[2074]: I1213 13:58:04.318295 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b48baafb-9fea-4925-9d77-083a8f796626-policysync\") pod \"calico-node-pq55v\" (UID: \"b48baafb-9fea-4925-9d77-083a8f796626\") " pod="calico-system/calico-node-pq55v" Dec 13 13:58:04.318336 kubelet[2074]: I1213 13:58:04.318314 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b48baafb-9fea-4925-9d77-083a8f796626-node-certs\") pod \"calico-node-pq55v\" (UID: \"b48baafb-9fea-4925-9d77-083a8f796626\") " pod="calico-system/calico-node-pq55v" Dec 13 13:58:04.318336 kubelet[2074]: I1213 13:58:04.318333 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b48baafb-9fea-4925-9d77-083a8f796626-var-lib-calico\") pod \"calico-node-pq55v\" (UID: \"b48baafb-9fea-4925-9d77-083a8f796626\") " pod="calico-system/calico-node-pq55v" Dec 13 13:58:04.318382 kubelet[2074]: I1213 13:58:04.318351 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b48baafb-9fea-4925-9d77-083a8f796626-cni-net-dir\") pod \"calico-node-pq55v\" (UID: \"b48baafb-9fea-4925-9d77-083a8f796626\") " pod="calico-system/calico-node-pq55v" Dec 13 13:58:04.318382 kubelet[2074]: I1213 13:58:04.318371 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b48baafb-9fea-4925-9d77-083a8f796626-cni-log-dir\") pod \"calico-node-pq55v\" (UID: \"b48baafb-9fea-4925-9d77-083a8f796626\") " pod="calico-system/calico-node-pq55v" Dec 13 13:58:04.318428 kubelet[2074]: I1213 13:58:04.318392 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa-kubelet-dir\") pod \"csi-node-driver-674z4\" (UID: \"5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa\") " pod="calico-system/csi-node-driver-674z4" Dec 13 13:58:04.318428 kubelet[2074]: I1213 13:58:04.318413 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b48baafb-9fea-4925-9d77-083a8f796626-lib-modules\") pod \"calico-node-pq55v\" (UID: \"b48baafb-9fea-4925-9d77-083a8f796626\") " pod="calico-system/calico-node-pq55v" Dec 13 13:58:04.318491 kubelet[2074]: I1213 13:58:04.318431 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dfde137c-93b7-4df9-b9da-42e30c030adc-tigera-ca-bundle\") pod \"calico-typha-66c5465794-6jggk\" (UID: \"dfde137c-93b7-4df9-b9da-42e30c030adc\") " pod="calico-system/calico-typha-66c5465794-6jggk" Dec 13 13:58:04.318491 kubelet[2074]: I1213 13:58:04.318468 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-84n7g\" (UniqueName: \"kubernetes.io/projected/dfde137c-93b7-4df9-b9da-42e30c030adc-kube-api-access-84n7g\") pod \"calico-typha-66c5465794-6jggk\" (UID: \"dfde137c-93b7-4df9-b9da-42e30c030adc\") " pod="calico-system/calico-typha-66c5465794-6jggk" Dec 13 13:58:04.318491 kubelet[2074]: I1213 13:58:04.318492 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa-socket-dir\") pod \"csi-node-driver-674z4\" (UID: \"5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa\") " pod="calico-system/csi-node-driver-674z4" Dec 13 13:58:04.423246 kubelet[2074]: E1213 13:58:04.423143 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:04.423246 kubelet[2074]: W1213 13:58:04.423168 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:04.423246 kubelet[2074]: E1213 13:58:04.423197 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:04.427360 kubelet[2074]: E1213 13:58:04.427340 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:04.427360 kubelet[2074]: W1213 13:58:04.427356 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:04.427563 kubelet[2074]: E1213 13:58:04.427376 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:04.427624 kubelet[2074]: E1213 13:58:04.427584 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:04.427624 kubelet[2074]: W1213 13:58:04.427596 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:04.427624 kubelet[2074]: E1213 13:58:04.427609 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:04.435113 kubelet[2074]: E1213 13:58:04.435096 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:04.435246 kubelet[2074]: W1213 13:58:04.435230 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:04.435312 kubelet[2074]: E1213 13:58:04.435302 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:04.440220 kubelet[2074]: E1213 13:58:04.440201 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:04.440337 kubelet[2074]: W1213 13:58:04.440320 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:04.440399 kubelet[2074]: E1213 13:58:04.440388 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:04.442604 kubelet[2074]: E1213 13:58:04.442311 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:04.442604 kubelet[2074]: W1213 13:58:04.442335 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:04.442604 kubelet[2074]: E1213 13:58:04.442355 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:04.452566 kubelet[2074]: E1213 13:58:04.452534 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:04.454502 env[1222]: time="2024-12-13T13:58:04.453997258Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-66c5465794-6jggk,Uid:dfde137c-93b7-4df9-b9da-42e30c030adc,Namespace:calico-system,Attempt:0,}" Dec 13 13:58:04.467726 env[1222]: time="2024-12-13T13:58:04.467655825Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:58:04.467726 env[1222]: time="2024-12-13T13:58:04.467700434Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:58:04.467726 env[1222]: time="2024-12-13T13:58:04.467711396Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:58:04.467924 env[1222]: time="2024-12-13T13:58:04.467843824Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/400b28f2d0546185b6d302dccfa377362ec04441b31cce97572122dbb2c53cbb pid=2477 runtime=io.containerd.runc.v2 Dec 13 13:58:04.477600 systemd[1]: Started cri-containerd-400b28f2d0546185b6d302dccfa377362ec04441b31cce97572122dbb2c53cbb.scope. Dec 13 13:58:04.501388 kubelet[2074]: E1213 13:58:04.501352 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:04.502693 env[1222]: time="2024-12-13T13:58:04.502656479Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pq55v,Uid:b48baafb-9fea-4925-9d77-083a8f796626,Namespace:calico-system,Attempt:0,}" Dec 13 13:58:04.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit: BPF prog-id=115 op=LOAD Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2477 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:04.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306232386632643035343631383562366433303264636366613337 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2477 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:04.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306232386632643035343631383562366433303264636366613337 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit: BPF prog-id=116 op=LOAD Dec 13 13:58:04.515000 audit[2487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2477 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:04.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306232386632643035343631383562366433303264636366613337 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit: BPF prog-id=117 op=LOAD Dec 13 13:58:04.515000 audit[2487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2477 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:04.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306232386632643035343631383562366433303264636366613337 Dec 13 13:58:04.515000 audit: BPF prog-id=117 op=UNLOAD Dec 13 13:58:04.515000 audit: BPF prog-id=116 op=UNLOAD Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.515000 audit: BPF prog-id=118 op=LOAD Dec 13 13:58:04.515000 audit[2487]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2477 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:04.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306232386632643035343631383562366433303264636366613337 Dec 13 13:58:04.521005 env[1222]: time="2024-12-13T13:58:04.520930287Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:58:04.521005 env[1222]: time="2024-12-13T13:58:04.520974336Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:58:04.521005 env[1222]: time="2024-12-13T13:58:04.520984699Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:58:04.521409 env[1222]: time="2024-12-13T13:58:04.521375260Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d2000339548bdbe520ee509d7112371ad8a1bbb71b4afc1824ba151ba72e3727 pid=2510 runtime=io.containerd.runc.v2 Dec 13 13:58:04.533106 env[1222]: time="2024-12-13T13:58:04.533062336Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-66c5465794-6jggk,Uid:dfde137c-93b7-4df9-b9da-42e30c030adc,Namespace:calico-system,Attempt:0,} returns sandbox id \"400b28f2d0546185b6d302dccfa377362ec04441b31cce97572122dbb2c53cbb\"" Dec 13 13:58:04.533732 kubelet[2074]: E1213 13:58:04.533707 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:04.534834 systemd[1]: Started cri-containerd-d2000339548bdbe520ee509d7112371ad8a1bbb71b4afc1824ba151ba72e3727.scope. Dec 13 13:58:04.546054 env[1222]: time="2024-12-13T13:58:04.541606476Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 13:58:04.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit: BPF prog-id=119 op=LOAD Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[2520]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2510 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:04.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432303030333339353438626462653532306565353039643731313233 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[2520]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2510 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:04.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432303030333339353438626462653532306565353039643731313233 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit: BPF prog-id=120 op=LOAD Dec 13 13:58:04.573000 audit[2520]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2510 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:04.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432303030333339353438626462653532306565353039643731313233 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.573000 audit: BPF prog-id=121 op=LOAD Dec 13 13:58:04.573000 audit[2520]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2510 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:04.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432303030333339353438626462653532306565353039643731313233 Dec 13 13:58:04.573000 audit: BPF prog-id=121 op=UNLOAD Dec 13 13:58:04.573000 audit: BPF prog-id=120 op=UNLOAD Dec 13 13:58:04.574000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.574000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.574000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.574000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.574000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.574000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.574000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.574000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.574000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.574000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:04.574000 audit: BPF prog-id=122 op=LOAD Dec 13 13:58:04.574000 audit[2520]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2510 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:04.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432303030333339353438626462653532306565353039643731313233 Dec 13 13:58:04.583761 env[1222]: time="2024-12-13T13:58:04.583704209Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pq55v,Uid:b48baafb-9fea-4925-9d77-083a8f796626,Namespace:calico-system,Attempt:0,} returns sandbox id \"d2000339548bdbe520ee509d7112371ad8a1bbb71b4afc1824ba151ba72e3727\"" Dec 13 13:58:04.584715 kubelet[2074]: E1213 13:58:04.584520 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:05.080000 audit[2554]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:05.080000 audit[2554]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6652 a0=3 a1=ffffe95def40 a2=0 a3=1 items=0 ppid=2234 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:05.080000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:05.089000 audit[2554]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:05.089000 audit[2554]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe95def40 a2=0 a3=1 items=0 ppid=2234 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:05.089000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:05.698570 kubelet[2074]: E1213 13:58:05.698358 2074 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-674z4" podUID="5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa" Dec 13 13:58:05.907022 env[1222]: time="2024-12-13T13:58:05.906973463Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:05.909114 env[1222]: time="2024-12-13T13:58:05.909084844Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d1fc316829ae1650b0b1629b54232520f297e7c3b1444eecd290ae088902a28,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:05.910754 env[1222]: time="2024-12-13T13:58:05.910711849Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:05.912536 env[1222]: time="2024-12-13T13:58:05.912509527Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:05.913063 env[1222]: time="2024-12-13T13:58:05.913036672Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:1d1fc316829ae1650b0b1629b54232520f297e7c3b1444eecd290ae088902a28\"" Dec 13 13:58:05.919383 env[1222]: time="2024-12-13T13:58:05.919359574Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 13:58:05.929780 env[1222]: time="2024-12-13T13:58:05.929752726Z" level=info msg="CreateContainer within sandbox \"400b28f2d0546185b6d302dccfa377362ec04441b31cce97572122dbb2c53cbb\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 13:58:05.938479 env[1222]: time="2024-12-13T13:58:05.938418455Z" level=info msg="CreateContainer within sandbox \"400b28f2d0546185b6d302dccfa377362ec04441b31cce97572122dbb2c53cbb\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"379099bc0274fbc2d04f8623e5d93f614cb09ef48a6ab9c1dc98d8b0315ee2e3\"" Dec 13 13:58:05.939859 env[1222]: time="2024-12-13T13:58:05.939608612Z" level=info msg="StartContainer for \"379099bc0274fbc2d04f8623e5d93f614cb09ef48a6ab9c1dc98d8b0315ee2e3\"" Dec 13 13:58:05.955849 systemd[1]: Started cri-containerd-379099bc0274fbc2d04f8623e5d93f614cb09ef48a6ab9c1dc98d8b0315ee2e3.scope. Dec 13 13:58:05.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit: BPF prog-id=123 op=LOAD Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2477 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:05.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337393039396263303237346662633264303466383632336535643933 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2477 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:05.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337393039396263303237346662633264303466383632336535643933 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit: BPF prog-id=124 op=LOAD Dec 13 13:58:05.990000 audit[2565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2477 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:05.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337393039396263303237346662633264303466383632336535643933 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit: BPF prog-id=125 op=LOAD Dec 13 13:58:05.990000 audit[2565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2477 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:05.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337393039396263303237346662633264303466383632336535643933 Dec 13 13:58:05.990000 audit: BPF prog-id=125 op=UNLOAD Dec 13 13:58:05.990000 audit: BPF prog-id=124 op=UNLOAD Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:05.990000 audit: BPF prog-id=126 op=LOAD Dec 13 13:58:05.990000 audit[2565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2477 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:05.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337393039396263303237346662633264303466383632336535643933 Dec 13 13:58:06.098305 env[1222]: time="2024-12-13T13:58:06.098255313Z" level=info msg="StartContainer for \"379099bc0274fbc2d04f8623e5d93f614cb09ef48a6ab9c1dc98d8b0315ee2e3\" returns successfully" Dec 13 13:58:06.756331 kubelet[2074]: E1213 13:58:06.756284 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:06.778533 kubelet[2074]: I1213 13:58:06.778212 2074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-66c5465794-6jggk" podStartSLOduration=1.399397249 podStartE2EDuration="2.778177614s" podCreationTimestamp="2024-12-13 13:58:04 +0000 UTC" firstStartedPulling="2024-12-13 13:58:04.534606737 +0000 UTC m=+21.980563956" lastFinishedPulling="2024-12-13 13:58:05.913387102 +0000 UTC m=+23.359344321" observedRunningTime="2024-12-13 13:58:06.777953931 +0000 UTC m=+24.223911150" watchObservedRunningTime="2024-12-13 13:58:06.778177614 +0000 UTC m=+24.224134833" Dec 13 13:58:06.817177 env[1222]: time="2024-12-13T13:58:06.817133017Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:06.818474 env[1222]: time="2024-12-13T13:58:06.818440627Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:06.819983 env[1222]: time="2024-12-13T13:58:06.819946274Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:06.821043 env[1222]: time="2024-12-13T13:58:06.821017679Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:06.821652 env[1222]: time="2024-12-13T13:58:06.821624035Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348\"" Dec 13 13:58:06.827987 env[1222]: time="2024-12-13T13:58:06.827955844Z" level=info msg="CreateContainer within sandbox \"d2000339548bdbe520ee509d7112371ad8a1bbb71b4afc1824ba151ba72e3727\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 13:58:06.839813 env[1222]: time="2024-12-13T13:58:06.839776583Z" level=info msg="CreateContainer within sandbox \"d2000339548bdbe520ee509d7112371ad8a1bbb71b4afc1824ba151ba72e3727\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"2fda4d1e557098ed834aad9ef8a28e492b797bdfcc5eb9bf3fe62bb40cf78607\"" Dec 13 13:58:06.840499 env[1222]: time="2024-12-13T13:58:06.840348812Z" level=info msg="StartContainer for \"2fda4d1e557098ed834aad9ef8a28e492b797bdfcc5eb9bf3fe62bb40cf78607\"" Dec 13 13:58:06.843292 kubelet[2074]: E1213 13:58:06.843268 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:06.843404 kubelet[2074]: W1213 13:58:06.843386 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:06.843498 kubelet[2074]: E1213 13:58:06.843484 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:06.845109 kubelet[2074]: E1213 13:58:06.845088 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:06.845208 kubelet[2074]: W1213 13:58:06.845194 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:06.845269 kubelet[2074]: E1213 13:58:06.845259 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:06.845542 kubelet[2074]: E1213 13:58:06.845525 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:06.845628 kubelet[2074]: W1213 13:58:06.845615 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:06.845684 kubelet[2074]: E1213 13:58:06.845675 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:06.845959 kubelet[2074]: E1213 13:58:06.845945 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:06.846048 kubelet[2074]: W1213 13:58:06.846034 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:06.846114 kubelet[2074]: E1213 13:58:06.846103 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:06.846683 kubelet[2074]: E1213 13:58:06.846667 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:06.846778 kubelet[2074]: W1213 13:58:06.846764 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:06.846839 kubelet[2074]: E1213 13:58:06.846829 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:06.847090 kubelet[2074]: E1213 13:58:06.847076 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:06.847167 kubelet[2074]: W1213 13:58:06.847154 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:06.847227 kubelet[2074]: E1213 13:58:06.847218 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:06.847468 kubelet[2074]: E1213 13:58:06.847442 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:06.847538 kubelet[2074]: W1213 13:58:06.847525 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:06.847601 kubelet[2074]: E1213 13:58:06.847592 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:06.850851 kubelet[2074]: E1213 13:58:06.850686 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:06.850851 kubelet[2074]: W1213 13:58:06.850697 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:06.850851 kubelet[2074]: E1213 13:58:06.850711 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:06.851202 kubelet[2074]: E1213 13:58:06.851184 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:06.851247 kubelet[2074]: W1213 13:58:06.851198 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:06.851247 kubelet[2074]: E1213 13:58:06.851227 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:06.851534 kubelet[2074]: E1213 13:58:06.851520 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:06.851534 kubelet[2074]: W1213 13:58:06.851532 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:06.851593 kubelet[2074]: E1213 13:58:06.851547 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:06.851725 kubelet[2074]: E1213 13:58:06.851714 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:06.851725 kubelet[2074]: W1213 13:58:06.851724 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:06.851782 kubelet[2074]: E1213 13:58:06.851734 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:06.851874 kubelet[2074]: E1213 13:58:06.851863 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:06.851874 kubelet[2074]: W1213 13:58:06.851873 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:06.851919 kubelet[2074]: E1213 13:58:06.851883 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:06.852030 kubelet[2074]: E1213 13:58:06.852020 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:06.852030 kubelet[2074]: W1213 13:58:06.852029 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:06.852078 kubelet[2074]: E1213 13:58:06.852039 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:06.852167 kubelet[2074]: E1213 13:58:06.852158 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:06.852167 kubelet[2074]: W1213 13:58:06.852166 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:06.852220 kubelet[2074]: E1213 13:58:06.852176 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:06.852360 kubelet[2074]: E1213 13:58:06.852349 2074 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:06.852393 kubelet[2074]: W1213 13:58:06.852359 2074 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:06.852393 kubelet[2074]: E1213 13:58:06.852376 2074 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:06.860493 systemd[1]: Started cri-containerd-2fda4d1e557098ed834aad9ef8a28e492b797bdfcc5eb9bf3fe62bb40cf78607.scope. Dec 13 13:58:06.888000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.888000 audit[2611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2510 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:06.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266646134643165353537303938656438333461616439656638613238 Dec 13 13:58:06.888000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.888000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.888000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.888000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.888000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.888000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.888000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.888000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.888000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.888000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.888000 audit: BPF prog-id=127 op=LOAD Dec 13 13:58:06.888000 audit[2611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2510 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:06.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266646134643165353537303938656438333461616439656638613238 Dec 13 13:58:06.889000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.889000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.889000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.889000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.889000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.889000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.889000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.889000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.889000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.889000 audit: BPF prog-id=128 op=LOAD Dec 13 13:58:06.889000 audit[2611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2510 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:06.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266646134643165353537303938656438333461616439656638613238 Dec 13 13:58:06.889000 audit: BPF prog-id=128 op=UNLOAD Dec 13 13:58:06.889000 audit: BPF prog-id=127 op=UNLOAD Dec 13 13:58:06.889000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.889000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.889000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.889000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.889000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.889000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.889000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.889000 audit[2611]: AVC avc: denied { perfmon } for pid=2611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.889000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.889000 audit[2611]: AVC avc: denied { bpf } for pid=2611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:06.889000 audit: BPF prog-id=129 op=LOAD Dec 13 13:58:06.889000 audit[2611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2510 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:06.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266646134643165353537303938656438333461616439656638613238 Dec 13 13:58:06.902804 env[1222]: time="2024-12-13T13:58:06.902765457Z" level=info msg="StartContainer for \"2fda4d1e557098ed834aad9ef8a28e492b797bdfcc5eb9bf3fe62bb40cf78607\" returns successfully" Dec 13 13:58:06.928658 systemd[1]: cri-containerd-2fda4d1e557098ed834aad9ef8a28e492b797bdfcc5eb9bf3fe62bb40cf78607.scope: Deactivated successfully. Dec 13 13:58:06.933000 audit: BPF prog-id=129 op=UNLOAD Dec 13 13:58:06.961514 env[1222]: time="2024-12-13T13:58:06.961460951Z" level=info msg="shim disconnected" id=2fda4d1e557098ed834aad9ef8a28e492b797bdfcc5eb9bf3fe62bb40cf78607 Dec 13 13:58:06.961514 env[1222]: time="2024-12-13T13:58:06.961506840Z" level=warning msg="cleaning up after shim disconnected" id=2fda4d1e557098ed834aad9ef8a28e492b797bdfcc5eb9bf3fe62bb40cf78607 namespace=k8s.io Dec 13 13:58:06.961514 env[1222]: time="2024-12-13T13:58:06.961516562Z" level=info msg="cleaning up dead shim" Dec 13 13:58:06.967623 env[1222]: time="2024-12-13T13:58:06.967589482Z" level=warning msg="cleanup warnings time=\"2024-12-13T13:58:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2663 runtime=io.containerd.runc.v2\n" Dec 13 13:58:07.424008 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2fda4d1e557098ed834aad9ef8a28e492b797bdfcc5eb9bf3fe62bb40cf78607-rootfs.mount: Deactivated successfully. Dec 13 13:58:07.699631 kubelet[2074]: E1213 13:58:07.699526 2074 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-674z4" podUID="5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa" Dec 13 13:58:07.759109 kubelet[2074]: E1213 13:58:07.759067 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:07.759421 kubelet[2074]: I1213 13:58:07.759219 2074 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 13:58:07.759745 kubelet[2074]: E1213 13:58:07.759725 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:07.760632 env[1222]: time="2024-12-13T13:58:07.760571963Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 13:58:09.698828 kubelet[2074]: E1213 13:58:09.698488 2074 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-674z4" podUID="5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa" Dec 13 13:58:11.615353 env[1222]: time="2024-12-13T13:58:11.615300537Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:11.618656 env[1222]: time="2024-12-13T13:58:11.618628297Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:11.621211 env[1222]: time="2024-12-13T13:58:11.621183457Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:11.623026 env[1222]: time="2024-12-13T13:58:11.622985298Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:11.623702 env[1222]: time="2024-12-13T13:58:11.623652003Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f\"" Dec 13 13:58:11.625520 env[1222]: time="2024-12-13T13:58:11.625488050Z" level=info msg="CreateContainer within sandbox \"d2000339548bdbe520ee509d7112371ad8a1bbb71b4afc1824ba151ba72e3727\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 13:58:11.638327 env[1222]: time="2024-12-13T13:58:11.638266087Z" level=info msg="CreateContainer within sandbox \"d2000339548bdbe520ee509d7112371ad8a1bbb71b4afc1824ba151ba72e3727\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"40cb6308be61deb10f76a1340bbc2a0462e2ff36fee6cae8f6a4b4cd075c15b4\"" Dec 13 13:58:11.639792 env[1222]: time="2024-12-13T13:58:11.638935432Z" level=info msg="StartContainer for \"40cb6308be61deb10f76a1340bbc2a0462e2ff36fee6cae8f6a4b4cd075c15b4\"" Dec 13 13:58:11.658084 systemd[1]: run-containerd-runc-k8s.io-40cb6308be61deb10f76a1340bbc2a0462e2ff36fee6cae8f6a4b4cd075c15b4-runc.KDGU9p.mount: Deactivated successfully. Dec 13 13:58:11.661777 systemd[1]: Started cri-containerd-40cb6308be61deb10f76a1340bbc2a0462e2ff36fee6cae8f6a4b4cd075c15b4.scope. Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.694076 kernel: kauditd_printk_skb: 223 callbacks suppressed Dec 13 13:58:11.694139 kernel: audit: type=1400 audit(1734098291.692:989): avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit[2685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2510 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.699564 kubelet[2074]: E1213 13:58:11.699531 2074 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-674z4" podUID="5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa" Dec 13 13:58:11.700532 kernel: audit: type=1300 audit(1734098291.692:989): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2510 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.700648 kernel: audit: type=1327 audit(1734098291.692:989): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430636236333038626536316465623130663736613133343062626332 Dec 13 13:58:11.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430636236333038626536316465623130663736613133343062626332 Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.706799 kernel: audit: type=1400 audit(1734098291.692:990): avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.706886 kernel: audit: type=1400 audit(1734098291.692:990): avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.711269 kernel: audit: type=1400 audit(1734098291.692:990): avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.714233 kernel: audit: type=1400 audit(1734098291.692:990): avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.714330 kernel: audit: type=1400 audit(1734098291.692:990): avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.717723 env[1222]: time="2024-12-13T13:58:11.717678141Z" level=info msg="StartContainer for \"40cb6308be61deb10f76a1340bbc2a0462e2ff36fee6cae8f6a4b4cd075c15b4\" returns successfully" Dec 13 13:58:11.719472 kernel: audit: type=1400 audit(1734098291.692:990): avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.719557 kernel: audit: type=1400 audit(1734098291.692:990): avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit: BPF prog-id=130 op=LOAD Dec 13 13:58:11.692000 audit[2685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2510 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430636236333038626536316465623130663736613133343062626332 Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.692000 audit: BPF prog-id=131 op=LOAD Dec 13 13:58:11.692000 audit[2685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2510 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430636236333038626536316465623130663736613133343062626332 Dec 13 13:58:11.693000 audit: BPF prog-id=131 op=UNLOAD Dec 13 13:58:11.693000 audit: BPF prog-id=130 op=UNLOAD Dec 13 13:58:11.693000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.693000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.693000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.693000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.693000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.693000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.693000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.693000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.693000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.693000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.693000 audit: BPF prog-id=132 op=LOAD Dec 13 13:58:11.693000 audit[2685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2510 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430636236333038626536316465623130663736613133343062626332 Dec 13 13:58:11.769870 kubelet[2074]: E1213 13:58:11.769697 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:12.024541 systemd[1]: Started sshd@7-10.0.0.25:22-10.0.0.1:55036.service. Dec 13 13:58:12.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.25:22-10.0.0.1:55036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:12.174000 audit[2716]: USER_ACCT pid=2716 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:12.176508 sshd[2716]: Accepted publickey for core from 10.0.0.1 port 55036 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:12.176000 audit[2716]: CRED_ACQ pid=2716 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:12.176000 audit[2716]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe83e4a00 a2=3 a3=1 items=0 ppid=1 pid=2716 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:12.176000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:12.178284 sshd[2716]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:12.184540 systemd-logind[1210]: New session 8 of user core. Dec 13 13:58:12.185506 systemd[1]: Started session-8.scope. Dec 13 13:58:12.188000 audit[2716]: USER_START pid=2716 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:12.190000 audit[2718]: CRED_ACQ pid=2718 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:12.343751 sshd[2716]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:12.343000 audit[2716]: USER_END pid=2716 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:12.343000 audit[2716]: CRED_DISP pid=2716 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:12.346420 systemd[1]: sshd@7-10.0.0.25:22-10.0.0.1:55036.service: Deactivated successfully. Dec 13 13:58:12.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.25:22-10.0.0.1:55036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:12.347141 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 13:58:12.347663 systemd-logind[1210]: Session 8 logged out. Waiting for processes to exit. Dec 13 13:58:12.348599 systemd-logind[1210]: Removed session 8. Dec 13 13:58:12.385536 systemd[1]: cri-containerd-40cb6308be61deb10f76a1340bbc2a0462e2ff36fee6cae8f6a4b4cd075c15b4.scope: Deactivated successfully. Dec 13 13:58:12.390000 audit: BPF prog-id=132 op=UNLOAD Dec 13 13:58:12.412901 env[1222]: time="2024-12-13T13:58:12.412857384Z" level=info msg="shim disconnected" id=40cb6308be61deb10f76a1340bbc2a0462e2ff36fee6cae8f6a4b4cd075c15b4 Dec 13 13:58:12.413173 env[1222]: time="2024-12-13T13:58:12.413153069Z" level=warning msg="cleaning up after shim disconnected" id=40cb6308be61deb10f76a1340bbc2a0462e2ff36fee6cae8f6a4b4cd075c15b4 namespace=k8s.io Dec 13 13:58:12.413267 env[1222]: time="2024-12-13T13:58:12.413250164Z" level=info msg="cleaning up dead shim" Dec 13 13:58:12.419760 env[1222]: time="2024-12-13T13:58:12.419730380Z" level=warning msg="cleanup warnings time=\"2024-12-13T13:58:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2741 runtime=io.containerd.runc.v2\n" Dec 13 13:58:12.431524 kubelet[2074]: I1213 13:58:12.429350 2074 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 13:58:12.452208 kubelet[2074]: I1213 13:58:12.451598 2074 topology_manager.go:215] "Topology Admit Handler" podUID="27e8634a-86dc-4fd9-be3d-789a986b1796" podNamespace="kube-system" podName="coredns-76f75df574-79klx" Dec 13 13:58:12.456939 systemd[1]: Created slice kubepods-burstable-pod27e8634a_86dc_4fd9_be3d_789a986b1796.slice. Dec 13 13:58:12.459918 kubelet[2074]: I1213 13:58:12.459338 2074 topology_manager.go:215] "Topology Admit Handler" podUID="abfada76-ba20-42c7-9bea-d459bdb5d231" podNamespace="calico-apiserver" podName="calico-apiserver-75546fc5b6-6f6gc" Dec 13 13:58:12.464393 kubelet[2074]: I1213 13:58:12.464359 2074 topology_manager.go:215] "Topology Admit Handler" podUID="e16f1cb8-65ba-4680-b325-d517863e2a42" podNamespace="calico-apiserver" podName="calico-apiserver-75546fc5b6-rqjk9" Dec 13 13:58:12.464540 kubelet[2074]: I1213 13:58:12.464518 2074 topology_manager.go:215] "Topology Admit Handler" podUID="7240c606-a927-478a-a105-0915e83b4114" podNamespace="kube-system" podName="coredns-76f75df574-n5nx7" Dec 13 13:58:12.464670 kubelet[2074]: I1213 13:58:12.464632 2074 topology_manager.go:215] "Topology Admit Handler" podUID="07ffb936-3e31-41ba-bf8f-d41af42cec36" podNamespace="calico-system" podName="calico-kube-controllers-6bcd7c76ff-25fc7" Dec 13 13:58:12.467832 systemd[1]: Created slice kubepods-besteffort-podabfada76_ba20_42c7_9bea_d459bdb5d231.slice. Dec 13 13:58:12.472444 systemd[1]: Created slice kubepods-besteffort-pode16f1cb8_65ba_4680_b325_d517863e2a42.slice. Dec 13 13:58:12.476947 systemd[1]: Created slice kubepods-burstable-pod7240c606_a927_478a_a105_0915e83b4114.slice. Dec 13 13:58:12.489368 systemd[1]: Created slice kubepods-besteffort-pod07ffb936_3e31_41ba_bf8f_d41af42cec36.slice. Dec 13 13:58:12.490953 kubelet[2074]: I1213 13:58:12.490926 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/07ffb936-3e31-41ba-bf8f-d41af42cec36-tigera-ca-bundle\") pod \"calico-kube-controllers-6bcd7c76ff-25fc7\" (UID: \"07ffb936-3e31-41ba-bf8f-d41af42cec36\") " pod="calico-system/calico-kube-controllers-6bcd7c76ff-25fc7" Dec 13 13:58:12.491102 kubelet[2074]: I1213 13:58:12.491087 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vdpcc\" (UniqueName: \"kubernetes.io/projected/e16f1cb8-65ba-4680-b325-d517863e2a42-kube-api-access-vdpcc\") pod \"calico-apiserver-75546fc5b6-rqjk9\" (UID: \"e16f1cb8-65ba-4680-b325-d517863e2a42\") " pod="calico-apiserver/calico-apiserver-75546fc5b6-rqjk9" Dec 13 13:58:12.491185 kubelet[2074]: I1213 13:58:12.491175 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mngr7\" (UniqueName: \"kubernetes.io/projected/07ffb936-3e31-41ba-bf8f-d41af42cec36-kube-api-access-mngr7\") pod \"calico-kube-controllers-6bcd7c76ff-25fc7\" (UID: \"07ffb936-3e31-41ba-bf8f-d41af42cec36\") " pod="calico-system/calico-kube-controllers-6bcd7c76ff-25fc7" Dec 13 13:58:12.491265 kubelet[2074]: I1213 13:58:12.491254 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e16f1cb8-65ba-4680-b325-d517863e2a42-calico-apiserver-certs\") pod \"calico-apiserver-75546fc5b6-rqjk9\" (UID: \"e16f1cb8-65ba-4680-b325-d517863e2a42\") " pod="calico-apiserver/calico-apiserver-75546fc5b6-rqjk9" Dec 13 13:58:12.491350 kubelet[2074]: I1213 13:58:12.491339 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/7240c606-a927-478a-a105-0915e83b4114-config-volume\") pod \"coredns-76f75df574-n5nx7\" (UID: \"7240c606-a927-478a-a105-0915e83b4114\") " pod="kube-system/coredns-76f75df574-n5nx7" Dec 13 13:58:12.491433 kubelet[2074]: I1213 13:58:12.491422 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-56npv\" (UniqueName: \"kubernetes.io/projected/7240c606-a927-478a-a105-0915e83b4114-kube-api-access-56npv\") pod \"coredns-76f75df574-n5nx7\" (UID: \"7240c606-a927-478a-a105-0915e83b4114\") " pod="kube-system/coredns-76f75df574-n5nx7" Dec 13 13:58:12.491550 kubelet[2074]: I1213 13:58:12.491537 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z6brf\" (UniqueName: \"kubernetes.io/projected/27e8634a-86dc-4fd9-be3d-789a986b1796-kube-api-access-z6brf\") pod \"coredns-76f75df574-79klx\" (UID: \"27e8634a-86dc-4fd9-be3d-789a986b1796\") " pod="kube-system/coredns-76f75df574-79klx" Dec 13 13:58:12.491628 kubelet[2074]: I1213 13:58:12.491619 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2njd5\" (UniqueName: \"kubernetes.io/projected/abfada76-ba20-42c7-9bea-d459bdb5d231-kube-api-access-2njd5\") pod \"calico-apiserver-75546fc5b6-6f6gc\" (UID: \"abfada76-ba20-42c7-9bea-d459bdb5d231\") " pod="calico-apiserver/calico-apiserver-75546fc5b6-6f6gc" Dec 13 13:58:12.491776 kubelet[2074]: I1213 13:58:12.491743 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/27e8634a-86dc-4fd9-be3d-789a986b1796-config-volume\") pod \"coredns-76f75df574-79klx\" (UID: \"27e8634a-86dc-4fd9-be3d-789a986b1796\") " pod="kube-system/coredns-76f75df574-79klx" Dec 13 13:58:12.491827 kubelet[2074]: I1213 13:58:12.491785 2074 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/abfada76-ba20-42c7-9bea-d459bdb5d231-calico-apiserver-certs\") pod \"calico-apiserver-75546fc5b6-6f6gc\" (UID: \"abfada76-ba20-42c7-9bea-d459bdb5d231\") " pod="calico-apiserver/calico-apiserver-75546fc5b6-6f6gc" Dec 13 13:58:12.640426 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-40cb6308be61deb10f76a1340bbc2a0462e2ff36fee6cae8f6a4b4cd075c15b4-rootfs.mount: Deactivated successfully. Dec 13 13:58:12.759837 kubelet[2074]: E1213 13:58:12.759800 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:12.761473 env[1222]: time="2024-12-13T13:58:12.761387722Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-79klx,Uid:27e8634a-86dc-4fd9-be3d-789a986b1796,Namespace:kube-system,Attempt:0,}" Dec 13 13:58:12.772755 env[1222]: time="2024-12-13T13:58:12.772707467Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75546fc5b6-6f6gc,Uid:abfada76-ba20-42c7-9bea-d459bdb5d231,Namespace:calico-apiserver,Attempt:0,}" Dec 13 13:58:12.774144 kubelet[2074]: E1213 13:58:12.774115 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:12.774720 env[1222]: time="2024-12-13T13:58:12.774685605Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 13:58:12.775045 env[1222]: time="2024-12-13T13:58:12.774954606Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75546fc5b6-rqjk9,Uid:e16f1cb8-65ba-4680-b325-d517863e2a42,Namespace:calico-apiserver,Attempt:0,}" Dec 13 13:58:12.780357 kubelet[2074]: E1213 13:58:12.780327 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:12.780839 env[1222]: time="2024-12-13T13:58:12.780805727Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-n5nx7,Uid:7240c606-a927-478a-a105-0915e83b4114,Namespace:kube-system,Attempt:0,}" Dec 13 13:58:12.792697 env[1222]: time="2024-12-13T13:58:12.792654312Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bcd7c76ff-25fc7,Uid:07ffb936-3e31-41ba-bf8f-d41af42cec36,Namespace:calico-system,Attempt:0,}" Dec 13 13:58:13.079479 env[1222]: time="2024-12-13T13:58:13.079377631Z" level=error msg="Failed to destroy network for sandbox \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.080108 env[1222]: time="2024-12-13T13:58:13.080068091Z" level=error msg="encountered an error cleaning up failed sandbox \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.080270 env[1222]: time="2024-12-13T13:58:13.080226114Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-n5nx7,Uid:7240c606-a927-478a-a105-0915e83b4114,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.082139 kubelet[2074]: E1213 13:58:13.082102 2074 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.082275 kubelet[2074]: E1213 13:58:13.082193 2074 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-n5nx7" Dec 13 13:58:13.082275 kubelet[2074]: E1213 13:58:13.082214 2074 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-n5nx7" Dec 13 13:58:13.082339 kubelet[2074]: E1213 13:58:13.082285 2074 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-n5nx7_kube-system(7240c606-a927-478a-a105-0915e83b4114)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-n5nx7_kube-system(7240c606-a927-478a-a105-0915e83b4114)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-n5nx7" podUID="7240c606-a927-478a-a105-0915e83b4114" Dec 13 13:58:13.092589 env[1222]: time="2024-12-13T13:58:13.092537543Z" level=error msg="Failed to destroy network for sandbox \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.092977 env[1222]: time="2024-12-13T13:58:13.092932840Z" level=error msg="encountered an error cleaning up failed sandbox \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.093055 env[1222]: time="2024-12-13T13:58:13.092991809Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bcd7c76ff-25fc7,Uid:07ffb936-3e31-41ba-bf8f-d41af42cec36,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.093300 kubelet[2074]: E1213 13:58:13.093267 2074 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.093376 kubelet[2074]: E1213 13:58:13.093328 2074 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6bcd7c76ff-25fc7" Dec 13 13:58:13.093376 kubelet[2074]: E1213 13:58:13.093347 2074 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6bcd7c76ff-25fc7" Dec 13 13:58:13.093459 kubelet[2074]: E1213 13:58:13.093416 2074 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6bcd7c76ff-25fc7_calico-system(07ffb936-3e31-41ba-bf8f-d41af42cec36)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6bcd7c76ff-25fc7_calico-system(07ffb936-3e31-41ba-bf8f-d41af42cec36)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bcd7c76ff-25fc7" podUID="07ffb936-3e31-41ba-bf8f-d41af42cec36" Dec 13 13:58:13.095291 env[1222]: time="2024-12-13T13:58:13.095246536Z" level=error msg="Failed to destroy network for sandbox \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.095648 env[1222]: time="2024-12-13T13:58:13.095595267Z" level=error msg="encountered an error cleaning up failed sandbox \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.095707 env[1222]: time="2024-12-13T13:58:13.095648115Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-79klx,Uid:27e8634a-86dc-4fd9-be3d-789a986b1796,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.096024 kubelet[2074]: E1213 13:58:13.095888 2074 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.096024 kubelet[2074]: E1213 13:58:13.095931 2074 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-79klx" Dec 13 13:58:13.096024 kubelet[2074]: E1213 13:58:13.095954 2074 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-79klx" Dec 13 13:58:13.096159 kubelet[2074]: E1213 13:58:13.095995 2074 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-79klx_kube-system(27e8634a-86dc-4fd9-be3d-789a986b1796)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-79klx_kube-system(27e8634a-86dc-4fd9-be3d-789a986b1796)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-79klx" podUID="27e8634a-86dc-4fd9-be3d-789a986b1796" Dec 13 13:58:13.099992 env[1222]: time="2024-12-13T13:58:13.099944539Z" level=error msg="Failed to destroy network for sandbox \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.100287 env[1222]: time="2024-12-13T13:58:13.100255064Z" level=error msg="encountered an error cleaning up failed sandbox \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.100346 env[1222]: time="2024-12-13T13:58:13.100303311Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75546fc5b6-6f6gc,Uid:abfada76-ba20-42c7-9bea-d459bdb5d231,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.100522 kubelet[2074]: E1213 13:58:13.100498 2074 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.100596 kubelet[2074]: E1213 13:58:13.100549 2074 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75546fc5b6-6f6gc" Dec 13 13:58:13.100596 kubelet[2074]: E1213 13:58:13.100567 2074 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75546fc5b6-6f6gc" Dec 13 13:58:13.100655 kubelet[2074]: E1213 13:58:13.100624 2074 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-75546fc5b6-6f6gc_calico-apiserver(abfada76-ba20-42c7-9bea-d459bdb5d231)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-75546fc5b6-6f6gc_calico-apiserver(abfada76-ba20-42c7-9bea-d459bdb5d231)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75546fc5b6-6f6gc" podUID="abfada76-ba20-42c7-9bea-d459bdb5d231" Dec 13 13:58:13.102287 env[1222]: time="2024-12-13T13:58:13.102247193Z" level=error msg="Failed to destroy network for sandbox \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.102732 env[1222]: time="2024-12-13T13:58:13.102696979Z" level=error msg="encountered an error cleaning up failed sandbox \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.102853 env[1222]: time="2024-12-13T13:58:13.102824877Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75546fc5b6-rqjk9,Uid:e16f1cb8-65ba-4680-b325-d517863e2a42,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.103130 kubelet[2074]: E1213 13:58:13.103110 2074 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.103195 kubelet[2074]: E1213 13:58:13.103149 2074 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75546fc5b6-rqjk9" Dec 13 13:58:13.103195 kubelet[2074]: E1213 13:58:13.103167 2074 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-75546fc5b6-rqjk9" Dec 13 13:58:13.103245 kubelet[2074]: E1213 13:58:13.103211 2074 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-75546fc5b6-rqjk9_calico-apiserver(e16f1cb8-65ba-4680-b325-d517863e2a42)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-75546fc5b6-rqjk9_calico-apiserver(e16f1cb8-65ba-4680-b325-d517863e2a42)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75546fc5b6-rqjk9" podUID="e16f1cb8-65ba-4680-b325-d517863e2a42" Dec 13 13:58:13.636013 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7-shm.mount: Deactivated successfully. Dec 13 13:58:13.636104 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48-shm.mount: Deactivated successfully. Dec 13 13:58:13.636163 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1-shm.mount: Deactivated successfully. Dec 13 13:58:13.636212 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20-shm.mount: Deactivated successfully. Dec 13 13:58:13.702892 systemd[1]: Created slice kubepods-besteffort-pod5c2cb822_4ee9_4ba9_ab95_4dd7188c73aa.slice. Dec 13 13:58:13.718178 env[1222]: time="2024-12-13T13:58:13.718135151Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-674z4,Uid:5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa,Namespace:calico-system,Attempt:0,}" Dec 13 13:58:13.779064 kubelet[2074]: I1213 13:58:13.779027 2074 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Dec 13 13:58:13.779879 env[1222]: time="2024-12-13T13:58:13.779839075Z" level=info msg="StopPodSandbox for \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\"" Dec 13 13:58:13.781959 kubelet[2074]: I1213 13:58:13.781928 2074 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Dec 13 13:58:13.782439 env[1222]: time="2024-12-13T13:58:13.782399207Z" level=info msg="StopPodSandbox for \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\"" Dec 13 13:58:13.784886 kubelet[2074]: I1213 13:58:13.784846 2074 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Dec 13 13:58:13.785807 env[1222]: time="2024-12-13T13:58:13.785767056Z" level=info msg="StopPodSandbox for \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\"" Dec 13 13:58:13.786236 kubelet[2074]: I1213 13:58:13.786209 2074 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Dec 13 13:58:13.786696 env[1222]: time="2024-12-13T13:58:13.786665707Z" level=info msg="StopPodSandbox for \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\"" Dec 13 13:58:13.800996 kubelet[2074]: I1213 13:58:13.800967 2074 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Dec 13 13:58:13.801603 env[1222]: time="2024-12-13T13:58:13.801568832Z" level=info msg="StopPodSandbox for \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\"" Dec 13 13:58:13.853209 env[1222]: time="2024-12-13T13:58:13.853155567Z" level=error msg="StopPodSandbox for \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\" failed" error="failed to destroy network for sandbox \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.854900 kubelet[2074]: E1213 13:58:13.854859 2074 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Dec 13 13:58:13.855009 kubelet[2074]: E1213 13:58:13.854959 2074 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48"} Dec 13 13:58:13.855009 kubelet[2074]: E1213 13:58:13.854997 2074 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e16f1cb8-65ba-4680-b325-d517863e2a42\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 13:58:13.855089 kubelet[2074]: E1213 13:58:13.855024 2074 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e16f1cb8-65ba-4680-b325-d517863e2a42\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75546fc5b6-rqjk9" podUID="e16f1cb8-65ba-4680-b325-d517863e2a42" Dec 13 13:58:13.876975 env[1222]: time="2024-12-13T13:58:13.876919819Z" level=error msg="StopPodSandbox for \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\" failed" error="failed to destroy network for sandbox \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.877360 kubelet[2074]: E1213 13:58:13.877327 2074 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Dec 13 13:58:13.877441 kubelet[2074]: E1213 13:58:13.877379 2074 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1"} Dec 13 13:58:13.877441 kubelet[2074]: E1213 13:58:13.877413 2074 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"abfada76-ba20-42c7-9bea-d459bdb5d231\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 13:58:13.877441 kubelet[2074]: E1213 13:58:13.877441 2074 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"abfada76-ba20-42c7-9bea-d459bdb5d231\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-75546fc5b6-6f6gc" podUID="abfada76-ba20-42c7-9bea-d459bdb5d231" Dec 13 13:58:13.902784 env[1222]: time="2024-12-13T13:58:13.901705740Z" level=error msg="StopPodSandbox for \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\" failed" error="failed to destroy network for sandbox \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.902907 kubelet[2074]: E1213 13:58:13.902425 2074 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Dec 13 13:58:13.902907 kubelet[2074]: E1213 13:58:13.902476 2074 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7"} Dec 13 13:58:13.902907 kubelet[2074]: E1213 13:58:13.902518 2074 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"07ffb936-3e31-41ba-bf8f-d41af42cec36\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 13:58:13.902907 kubelet[2074]: E1213 13:58:13.902547 2074 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"07ffb936-3e31-41ba-bf8f-d41af42cec36\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bcd7c76ff-25fc7" podUID="07ffb936-3e31-41ba-bf8f-d41af42cec36" Dec 13 13:58:13.906790 env[1222]: time="2024-12-13T13:58:13.906733631Z" level=error msg="StopPodSandbox for \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\" failed" error="failed to destroy network for sandbox \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.906967 kubelet[2074]: E1213 13:58:13.906944 2074 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Dec 13 13:58:13.907018 kubelet[2074]: E1213 13:58:13.906982 2074 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b"} Dec 13 13:58:13.907018 kubelet[2074]: E1213 13:58:13.907015 2074 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7240c606-a927-478a-a105-0915e83b4114\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 13:58:13.907107 kubelet[2074]: E1213 13:58:13.907042 2074 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7240c606-a927-478a-a105-0915e83b4114\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-n5nx7" podUID="7240c606-a927-478a-a105-0915e83b4114" Dec 13 13:58:13.918643 env[1222]: time="2024-12-13T13:58:13.918592554Z" level=error msg="Failed to destroy network for sandbox \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.919253 env[1222]: time="2024-12-13T13:58:13.919220005Z" level=error msg="encountered an error cleaning up failed sandbox \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.919381 env[1222]: time="2024-12-13T13:58:13.919354584Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-674z4,Uid:5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.920627 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce-shm.mount: Deactivated successfully. Dec 13 13:58:13.921392 kubelet[2074]: E1213 13:58:13.921365 2074 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.921490 kubelet[2074]: E1213 13:58:13.921424 2074 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-674z4" Dec 13 13:58:13.921490 kubelet[2074]: E1213 13:58:13.921445 2074 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-674z4" Dec 13 13:58:13.921587 kubelet[2074]: E1213 13:58:13.921526 2074 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-674z4_calico-system(5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-674z4_calico-system(5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-674z4" podUID="5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa" Dec 13 13:58:13.958318 env[1222]: time="2024-12-13T13:58:13.958261517Z" level=error msg="StopPodSandbox for \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\" failed" error="failed to destroy network for sandbox \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:13.958539 kubelet[2074]: E1213 13:58:13.958503 2074 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Dec 13 13:58:13.958611 kubelet[2074]: E1213 13:58:13.958555 2074 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20"} Dec 13 13:58:13.958611 kubelet[2074]: E1213 13:58:13.958589 2074 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"27e8634a-86dc-4fd9-be3d-789a986b1796\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 13:58:13.958691 kubelet[2074]: E1213 13:58:13.958616 2074 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"27e8634a-86dc-4fd9-be3d-789a986b1796\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-79klx" podUID="27e8634a-86dc-4fd9-be3d-789a986b1796" Dec 13 13:58:14.351793 kubelet[2074]: I1213 13:58:14.351753 2074 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 13:58:14.352381 kubelet[2074]: E1213 13:58:14.352360 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:14.383000 audit[3108]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3108 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:14.383000 audit[3108]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd8f2cf00 a2=0 a3=1 items=0 ppid=2234 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:14.383000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:14.388000 audit[3108]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3108 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:14.388000 audit[3108]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffd8f2cf00 a2=0 a3=1 items=0 ppid=2234 pid=3108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:14.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:14.812934 kubelet[2074]: E1213 13:58:14.812895 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:14.813330 kubelet[2074]: I1213 13:58:14.813232 2074 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Dec 13 13:58:14.814241 env[1222]: time="2024-12-13T13:58:14.814199239Z" level=info msg="StopPodSandbox for \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\"" Dec 13 13:58:14.856235 env[1222]: time="2024-12-13T13:58:14.856171046Z" level=error msg="StopPodSandbox for \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\" failed" error="failed to destroy network for sandbox \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:14.857730 kubelet[2074]: E1213 13:58:14.857702 2074 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Dec 13 13:58:14.858088 kubelet[2074]: E1213 13:58:14.858067 2074 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce"} Dec 13 13:58:14.858153 kubelet[2074]: E1213 13:58:14.858118 2074 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 13:58:14.858153 kubelet[2074]: E1213 13:58:14.858147 2074 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-674z4" podUID="5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa" Dec 13 13:58:17.117444 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3099134752.mount: Deactivated successfully. Dec 13 13:58:17.349207 systemd[1]: Started sshd@8-10.0.0.25:22-10.0.0.1:33898.service. Dec 13 13:58:17.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.25:22-10.0.0.1:33898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:17.350035 kernel: kauditd_printk_skb: 51 callbacks suppressed Dec 13 13:58:17.350102 kernel: audit: type=1130 audit(1734098297.348:1007): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.25:22-10.0.0.1:33898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:17.415029 env[1222]: time="2024-12-13T13:58:17.414631259Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:17.416550 env[1222]: time="2024-12-13T13:58:17.416512138Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:17.418110 env[1222]: time="2024-12-13T13:58:17.418074776Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:17.419878 env[1222]: time="2024-12-13T13:58:17.419834800Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:17.420348 env[1222]: time="2024-12-13T13:58:17.420309820Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758\"" Dec 13 13:58:17.437361 env[1222]: time="2024-12-13T13:58:17.437329543Z" level=info msg="CreateContainer within sandbox \"d2000339548bdbe520ee509d7112371ad8a1bbb71b4afc1824ba151ba72e3727\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 13:58:17.441000 audit[3135]: USER_ACCT pid=3135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:17.443143 sshd[3135]: Accepted publickey for core from 10.0.0.1 port 33898 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:17.444718 sshd[3135]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:17.443000 audit[3135]: CRED_ACQ pid=3135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:17.449167 kernel: audit: type=1101 audit(1734098297.441:1008): pid=3135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:17.449246 kernel: audit: type=1103 audit(1734098297.443:1009): pid=3135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:17.449269 kernel: audit: type=1006 audit(1734098297.443:1010): pid=3135 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Dec 13 13:58:17.450207 systemd-logind[1210]: New session 9 of user core. Dec 13 13:58:17.443000 audit[3135]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8d80f90 a2=3 a3=1 items=0 ppid=1 pid=3135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:17.452603 systemd[1]: Started session-9.scope. Dec 13 13:58:17.454760 kernel: audit: type=1300 audit(1734098297.443:1010): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8d80f90 a2=3 a3=1 items=0 ppid=1 pid=3135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:17.454818 kernel: audit: type=1327 audit(1734098297.443:1010): proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:17.443000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:17.457336 env[1222]: time="2024-12-13T13:58:17.456837221Z" level=info msg="CreateContainer within sandbox \"d2000339548bdbe520ee509d7112371ad8a1bbb71b4afc1824ba151ba72e3727\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"fb42657d930e4c69f1e984c2ab47a4b15a22852b0654e515b39f5b51c28db53c\"" Dec 13 13:58:17.457336 env[1222]: time="2024-12-13T13:58:17.457252154Z" level=info msg="StartContainer for \"fb42657d930e4c69f1e984c2ab47a4b15a22852b0654e515b39f5b51c28db53c\"" Dec 13 13:58:17.458000 audit[3135]: USER_START pid=3135 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:17.459000 audit[3140]: CRED_ACQ pid=3140 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:17.466263 kernel: audit: type=1105 audit(1734098297.458:1011): pid=3135 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:17.466345 kernel: audit: type=1103 audit(1734098297.459:1012): pid=3140 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:17.474234 systemd[1]: Started cri-containerd-fb42657d930e4c69f1e984c2ab47a4b15a22852b0654e515b39f5b51c28db53c.scope. Dec 13 13:58:17.514478 kernel: audit: type=1400 audit(1734098297.507:1013): avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.514588 kernel: audit: type=1300 audit(1734098297.507:1013): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2510 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:17.507000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.507000 audit[3147]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2510 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:17.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662343236353764393330653463363966316539383463326162343761 Dec 13 13:58:17.507000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.507000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.507000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.507000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.507000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.507000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.507000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.507000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.507000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.507000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.507000 audit: BPF prog-id=133 op=LOAD Dec 13 13:58:17.507000 audit[3147]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2510 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:17.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662343236353764393330653463363966316539383463326162343761 Dec 13 13:58:17.510000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.510000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.510000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.510000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.510000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.510000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.510000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.510000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.510000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.510000 audit: BPF prog-id=134 op=LOAD Dec 13 13:58:17.510000 audit[3147]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2510 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:17.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662343236353764393330653463363966316539383463326162343761 Dec 13 13:58:17.513000 audit: BPF prog-id=134 op=UNLOAD Dec 13 13:58:17.513000 audit: BPF prog-id=133 op=UNLOAD Dec 13 13:58:17.513000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.513000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.513000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.513000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.513000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.513000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.513000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.513000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.513000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.513000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:17.513000 audit: BPF prog-id=135 op=LOAD Dec 13 13:58:17.513000 audit[3147]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2510 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:17.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662343236353764393330653463363966316539383463326162343761 Dec 13 13:58:17.532738 env[1222]: time="2024-12-13T13:58:17.532692418Z" level=info msg="StartContainer for \"fb42657d930e4c69f1e984c2ab47a4b15a22852b0654e515b39f5b51c28db53c\" returns successfully" Dec 13 13:58:17.612115 sshd[3135]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:17.612000 audit[3135]: USER_END pid=3135 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:17.612000 audit[3135]: CRED_DISP pid=3135 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:17.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.25:22-10.0.0.1:33898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:17.614629 systemd[1]: sshd@8-10.0.0.25:22-10.0.0.1:33898.service: Deactivated successfully. Dec 13 13:58:17.615404 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 13:58:17.616018 systemd-logind[1210]: Session 9 logged out. Waiting for processes to exit. Dec 13 13:58:17.617028 systemd-logind[1210]: Removed session 9. Dec 13 13:58:17.726614 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 13:58:17.726778 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 13:58:17.825283 kubelet[2074]: E1213 13:58:17.825249 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:17.839964 kubelet[2074]: I1213 13:58:17.839924 2074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-pq55v" podStartSLOduration=1.004902752 podStartE2EDuration="13.839885966s" podCreationTimestamp="2024-12-13 13:58:04 +0000 UTC" firstStartedPulling="2024-12-13 13:58:04.586051058 +0000 UTC m=+22.032008237" lastFinishedPulling="2024-12-13 13:58:17.421034232 +0000 UTC m=+34.866991451" observedRunningTime="2024-12-13 13:58:17.838510431 +0000 UTC m=+35.284467650" watchObservedRunningTime="2024-12-13 13:58:17.839885966 +0000 UTC m=+35.285843185" Dec 13 13:58:18.825756 kubelet[2074]: I1213 13:58:18.825723 2074 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 13:58:18.826426 kubelet[2074]: E1213 13:58:18.826410 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:19.063000 audit[3276]: AVC avc: denied { write } for pid=3276 comm="tee" name="fd" dev="proc" ino=17300 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:58:19.063000 audit[3276]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc47dfa2a a2=241 a3=1b6 items=1 ppid=3226 pid=3276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.063000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 13:58:19.063000 audit: PATH item=0 name="/dev/fd/63" inode=19296 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:58:19.063000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:58:19.070000 audit[3288]: AVC avc: denied { write } for pid=3288 comm="tee" name="fd" dev="proc" ino=16301 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:58:19.070000 audit[3288]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeed0fa1b a2=241 a3=1b6 items=1 ppid=3235 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.070000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 13:58:19.070000 audit: PATH item=0 name="/dev/fd/63" inode=16293 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:58:19.070000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:58:19.075000 audit[3296]: AVC avc: denied { write } for pid=3296 comm="tee" name="fd" dev="proc" ino=19303 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:58:19.075000 audit[3296]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdd3a9a2b a2=241 a3=1b6 items=1 ppid=3238 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.075000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 13:58:19.075000 audit: PATH item=0 name="/dev/fd/63" inode=16298 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:58:19.075000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:58:19.076000 audit[3298]: AVC avc: denied { write } for pid=3298 comm="tee" name="fd" dev="proc" ino=19307 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:58:19.076000 audit[3298]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe138ca2a a2=241 a3=1b6 items=1 ppid=3230 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.076000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 13:58:19.076000 audit: PATH item=0 name="/dev/fd/63" inode=17304 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:58:19.076000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:58:19.077000 audit[3282]: AVC avc: denied { write } for pid=3282 comm="tee" name="fd" dev="proc" ino=19311 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:58:19.077000 audit[3282]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd2e37a2c a2=241 a3=1b6 items=1 ppid=3234 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.077000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 13:58:19.077000 audit: PATH item=0 name="/dev/fd/63" inode=18327 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:58:19.077000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:58:19.080000 audit[3301]: AVC avc: denied { write } for pid=3301 comm="tee" name="fd" dev="proc" ino=16308 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:58:19.080000 audit[3301]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdd188a2a a2=241 a3=1b6 items=1 ppid=3229 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.080000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 13:58:19.080000 audit: PATH item=0 name="/dev/fd/63" inode=16305 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:58:19.080000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:58:19.105000 audit[3306]: AVC avc: denied { write } for pid=3306 comm="tee" name="fd" dev="proc" ino=16319 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:58:19.105000 audit[3306]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdebf0a1a a2=241 a3=1b6 items=1 ppid=3239 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.105000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 13:58:19.105000 audit: PATH item=0 name="/dev/fd/63" inode=17307 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:58:19.105000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit: BPF prog-id=136 op=LOAD Dec 13 13:58:19.211000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe15e3738 a2=98 a3=ffffe15e3728 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.211000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.211000 audit: BPF prog-id=136 op=UNLOAD Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit: BPF prog-id=137 op=LOAD Dec 13 13:58:19.211000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe15e33c8 a2=74 a3=95 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.211000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.211000 audit: BPF prog-id=137 op=UNLOAD Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.211000 audit: BPF prog-id=138 op=LOAD Dec 13 13:58:19.211000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe15e3428 a2=94 a3=2 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.211000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.211000 audit: BPF prog-id=138 op=UNLOAD Dec 13 13:58:19.295000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.295000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.295000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.295000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.295000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.295000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.295000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.295000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.295000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.295000 audit: BPF prog-id=139 op=LOAD Dec 13 13:58:19.295000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe15e33e8 a2=40 a3=ffffe15e3418 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.295000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.295000 audit: BPF prog-id=139 op=UNLOAD Dec 13 13:58:19.295000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.295000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffe15e3500 a2=50 a3=0 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.295000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe15e3458 a2=28 a3=ffffe15e3588 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe15e3488 a2=28 a3=ffffe15e35b8 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe15e3338 a2=28 a3=ffffe15e3468 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe15e34a8 a2=28 a3=ffffe15e35d8 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe15e3488 a2=28 a3=ffffe15e35b8 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe15e3478 a2=28 a3=ffffe15e35a8 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe15e34a8 a2=28 a3=ffffe15e35d8 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe15e3488 a2=28 a3=ffffe15e35b8 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe15e34a8 a2=28 a3=ffffe15e35d8 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe15e3478 a2=28 a3=ffffe15e35a8 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe15e34f8 a2=28 a3=ffffe15e3638 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe15e3230 a2=50 a3=0 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit: BPF prog-id=140 op=LOAD Dec 13 13:58:19.304000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe15e3238 a2=94 a3=5 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.304000 audit: BPF prog-id=140 op=UNLOAD Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe15e3340 a2=50 a3=0 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffe15e3488 a2=4 a3=3 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.304000 audit[3345]: AVC avc: denied { confidentiality } for pid=3345 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:58:19.304000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe15e3468 a2=94 a3=6 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.304000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { confidentiality } for pid=3345 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:58:19.305000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe15e2c38 a2=94 a3=83 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.305000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { perfmon } for pid=3345 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { bpf } for pid=3345 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.305000 audit[3345]: AVC avc: denied { confidentiality } for pid=3345 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:58:19.305000 audit[3345]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe15e2c38 a2=94 a3=83 items=0 ppid=3232 pid=3345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.305000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:19.318000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.318000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.318000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.318000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.318000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.318000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.318000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.318000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.318000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.318000 audit: BPF prog-id=141 op=LOAD Dec 13 13:58:19.318000 audit[3348]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffa12f6a8 a2=98 a3=fffffa12f698 items=0 ppid=3232 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.318000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 13:58:19.319000 audit: BPF prog-id=141 op=UNLOAD Dec 13 13:58:19.319000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.319000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.319000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.319000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.319000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.319000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.319000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.319000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.319000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.319000 audit: BPF prog-id=142 op=LOAD Dec 13 13:58:19.319000 audit[3348]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffa12f558 a2=74 a3=95 items=0 ppid=3232 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.319000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 13:58:19.319000 audit: BPF prog-id=142 op=UNLOAD Dec 13 13:58:19.319000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.319000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.319000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.319000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.319000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.319000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.319000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.319000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.319000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.319000 audit: BPF prog-id=143 op=LOAD Dec 13 13:58:19.319000 audit[3348]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffa12f588 a2=40 a3=fffffa12f5b8 items=0 ppid=3232 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.319000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 13:58:19.319000 audit: BPF prog-id=143 op=UNLOAD Dec 13 13:58:19.369860 systemd-networkd[1055]: vxlan.calico: Link UP Dec 13 13:58:19.369866 systemd-networkd[1055]: vxlan.calico: Gained carrier Dec 13 13:58:19.401000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.401000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.401000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.401000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.401000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.401000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.401000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.401000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.401000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.401000 audit: BPF prog-id=144 op=LOAD Dec 13 13:58:19.401000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffde93c058 a2=98 a3=ffffde93c048 items=0 ppid=3232 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.401000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:19.401000 audit: BPF prog-id=144 op=UNLOAD Dec 13 13:58:19.401000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.401000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.401000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.401000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.401000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.401000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.401000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.401000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.401000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.401000 audit: BPF prog-id=145 op=LOAD Dec 13 13:58:19.401000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffde93bd38 a2=74 a3=95 items=0 ppid=3232 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.401000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:19.402000 audit: BPF prog-id=145 op=UNLOAD Dec 13 13:58:19.402000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.402000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.402000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.402000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.402000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.402000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.402000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.402000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.402000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.402000 audit: BPF prog-id=146 op=LOAD Dec 13 13:58:19.402000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffde93bd98 a2=94 a3=2 items=0 ppid=3232 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.402000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:19.402000 audit: BPF prog-id=146 op=UNLOAD Dec 13 13:58:19.402000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.402000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffde93bdc8 a2=28 a3=ffffde93bef8 items=0 ppid=3232 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.402000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:19.403000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.403000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffde93bdf8 a2=28 a3=ffffde93bf28 items=0 ppid=3232 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:19.403000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.403000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffde93bca8 a2=28 a3=ffffde93bdd8 items=0 ppid=3232 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:19.403000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.403000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffde93be18 a2=28 a3=ffffde93bf48 items=0 ppid=3232 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.403000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffde93bdf8 a2=28 a3=ffffde93bf28 items=0 ppid=3232 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.404000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffde93bde8 a2=28 a3=ffffde93bf18 items=0 ppid=3232 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.404000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffde93be18 a2=28 a3=ffffde93bf48 items=0 ppid=3232 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.404000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffde93bdf8 a2=28 a3=ffffde93bf28 items=0 ppid=3232 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.404000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffde93be18 a2=28 a3=ffffde93bf48 items=0 ppid=3232 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.404000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffde93bde8 a2=28 a3=ffffde93bf18 items=0 ppid=3232 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.404000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffde93be68 a2=28 a3=ffffde93bfa8 items=0 ppid=3232 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.404000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit: BPF prog-id=147 op=LOAD Dec 13 13:58:19.404000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffde93bc88 a2=40 a3=ffffde93bcb8 items=0 ppid=3232 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.404000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:19.404000 audit: BPF prog-id=147 op=UNLOAD Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffde93bcb0 a2=50 a3=0 items=0 ppid=3232 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.404000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffde93bcb0 a2=50 a3=0 items=0 ppid=3232 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.404000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit: BPF prog-id=148 op=LOAD Dec 13 13:58:19.404000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffde93b418 a2=94 a3=2 items=0 ppid=3232 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.404000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:19.404000 audit: BPF prog-id=148 op=UNLOAD Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { perfmon } for pid=3376 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit[3376]: AVC avc: denied { bpf } for pid=3376 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.404000 audit: BPF prog-id=149 op=LOAD Dec 13 13:58:19.404000 audit[3376]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffde93b5a8 a2=94 a3=2d items=0 ppid=3232 pid=3376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.404000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:19.409000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.409000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.409000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.409000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.409000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.409000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.409000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.409000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.409000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.409000 audit: BPF prog-id=150 op=LOAD Dec 13 13:58:19.409000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd5b2b568 a2=98 a3=ffffd5b2b558 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.409000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.409000 audit: BPF prog-id=150 op=UNLOAD Dec 13 13:58:19.410000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.410000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.410000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.410000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.410000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.410000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.410000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.410000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.410000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.410000 audit: BPF prog-id=151 op=LOAD Dec 13 13:58:19.410000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd5b2b1f8 a2=74 a3=95 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.410000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.410000 audit: BPF prog-id=151 op=UNLOAD Dec 13 13:58:19.410000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.410000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.410000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.410000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.410000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.410000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.410000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.410000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.410000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.410000 audit: BPF prog-id=152 op=LOAD Dec 13 13:58:19.410000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd5b2b258 a2=94 a3=2 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.410000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.410000 audit: BPF prog-id=152 op=UNLOAD Dec 13 13:58:19.492000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.492000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.492000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.492000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.492000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.492000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.492000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.492000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.492000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.492000 audit: BPF prog-id=153 op=LOAD Dec 13 13:58:19.492000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd5b2b218 a2=40 a3=ffffd5b2b248 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.492000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.494000 audit: BPF prog-id=153 op=UNLOAD Dec 13 13:58:19.494000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.494000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd5b2b330 a2=50 a3=0 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.494000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd5b2b288 a2=28 a3=ffffd5b2b3b8 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.502000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd5b2b2b8 a2=28 a3=ffffd5b2b3e8 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.502000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd5b2b168 a2=28 a3=ffffd5b2b298 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.502000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd5b2b2d8 a2=28 a3=ffffd5b2b408 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.502000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd5b2b2b8 a2=28 a3=ffffd5b2b3e8 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.502000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd5b2b2a8 a2=28 a3=ffffd5b2b3d8 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.502000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd5b2b2d8 a2=28 a3=ffffd5b2b408 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.502000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd5b2b2b8 a2=28 a3=ffffd5b2b3e8 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.502000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd5b2b2d8 a2=28 a3=ffffd5b2b408 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.502000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd5b2b2a8 a2=28 a3=ffffd5b2b3d8 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.502000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd5b2b328 a2=28 a3=ffffd5b2b468 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.502000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd5b2b060 a2=50 a3=0 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.502000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit: BPF prog-id=154 op=LOAD Dec 13 13:58:19.502000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd5b2b068 a2=94 a3=5 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.502000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.502000 audit: BPF prog-id=154 op=UNLOAD Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd5b2b170 a2=50 a3=0 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.502000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd5b2b2b8 a2=4 a3=3 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.502000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.502000 audit[3384]: AVC avc: denied { confidentiality } for pid=3384 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:58:19.502000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd5b2b298 a2=94 a3=6 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.502000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { confidentiality } for pid=3384 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:58:19.503000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd5b2aa68 a2=94 a3=83 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.503000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { perfmon } for pid=3384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { confidentiality } for pid=3384 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:58:19.503000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd5b2aa68 a2=94 a3=83 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.503000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd5b2c4a8 a2=10 a3=ffffd5b2c598 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.503000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd5b2c368 a2=10 a3=ffffd5b2c458 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.503000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd5b2c2d8 a2=10 a3=ffffd5b2c458 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.503000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.503000 audit[3384]: AVC avc: denied { bpf } for pid=3384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.503000 audit[3384]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd5b2c2d8 a2=10 a3=ffffd5b2c458 items=0 ppid=3232 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.503000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:19.509000 audit: BPF prog-id=149 op=UNLOAD Dec 13 13:58:19.564000 audit[3406]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3406 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:58:19.564000 audit[3406]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffff7a58300 a2=0 a3=ffff94792fa8 items=0 ppid=3232 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.564000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:58:19.575000 audit[3405]: NETFILTER_CFG table=raw:98 family=2 entries=21 op=nft_register_chain pid=3405 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:58:19.575000 audit[3405]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffca5ae800 a2=0 a3=ffff9de82fa8 items=0 ppid=3232 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.575000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:58:19.575000 audit[3408]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=3408 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:58:19.575000 audit[3408]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=fffffa59c980 a2=0 a3=ffff92b92fa8 items=0 ppid=3232 pid=3408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.575000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:58:19.575000 audit[3409]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3409 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:58:19.575000 audit[3409]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffcb7400f0 a2=0 a3=ffff90859fa8 items=0 ppid=3232 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.575000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:58:21.109970 systemd-networkd[1055]: vxlan.calico: Gained IPv6LL Dec 13 13:58:22.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.25:22-10.0.0.1:46528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:22.617133 kernel: kauditd_printk_skb: 559 callbacks suppressed Dec 13 13:58:22.617170 kernel: audit: type=1130 audit(1734098302.614:1124): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.25:22-10.0.0.1:46528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:22.616134 systemd[1]: Started sshd@9-10.0.0.25:22-10.0.0.1:46528.service. Dec 13 13:58:22.692000 audit[3422]: USER_ACCT pid=3422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:22.694117 sshd[3422]: Accepted publickey for core from 10.0.0.1 port 46528 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:22.693000 audit[3422]: CRED_ACQ pid=3422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:22.697506 sshd[3422]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:22.700408 kernel: audit: type=1101 audit(1734098302.692:1125): pid=3422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:22.700572 kernel: audit: type=1103 audit(1734098302.693:1126): pid=3422 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:22.700733 kernel: audit: type=1006 audit(1734098302.693:1127): pid=3422 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 13:58:22.703491 kernel: audit: type=1300 audit(1734098302.693:1127): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe5ed73c0 a2=3 a3=1 items=0 ppid=1 pid=3422 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:22.693000 audit[3422]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe5ed73c0 a2=3 a3=1 items=0 ppid=1 pid=3422 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:22.704404 systemd[1]: Started session-10.scope. Dec 13 13:58:22.704871 systemd-logind[1210]: New session 10 of user core. Dec 13 13:58:22.693000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:22.706797 kernel: audit: type=1327 audit(1734098302.693:1127): proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:22.710000 audit[3422]: USER_START pid=3422 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:22.711000 audit[3424]: CRED_ACQ pid=3424 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:22.718011 kernel: audit: type=1105 audit(1734098302.710:1128): pid=3422 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:22.718064 kernel: audit: type=1103 audit(1734098302.711:1129): pid=3424 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:22.876512 sshd[3422]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:22.879000 audit[3422]: USER_END pid=3422 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:22.881506 systemd[1]: Started sshd@10-10.0.0.25:22-10.0.0.1:46540.service. Dec 13 13:58:22.882810 systemd[1]: sshd@9-10.0.0.25:22-10.0.0.1:46528.service: Deactivated successfully. Dec 13 13:58:22.883430 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 13:58:22.879000 audit[3422]: CRED_DISP pid=3422 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:22.887698 kernel: audit: type=1106 audit(1734098302.879:1130): pid=3422 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:22.887763 kernel: audit: type=1104 audit(1734098302.879:1131): pid=3422 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:22.887771 systemd-logind[1210]: Session 10 logged out. Waiting for processes to exit. Dec 13 13:58:22.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.25:22-10.0.0.1:46540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:22.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.25:22-10.0.0.1:46528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:22.888532 systemd-logind[1210]: Removed session 10. Dec 13 13:58:22.916000 audit[3435]: USER_ACCT pid=3435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:22.918599 sshd[3435]: Accepted publickey for core from 10.0.0.1 port 46540 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:22.918000 audit[3435]: CRED_ACQ pid=3435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:22.918000 audit[3435]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe39d7810 a2=3 a3=1 items=0 ppid=1 pid=3435 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:22.918000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:22.920130 sshd[3435]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:22.923316 systemd-logind[1210]: New session 11 of user core. Dec 13 13:58:22.924145 systemd[1]: Started session-11.scope. Dec 13 13:58:22.925000 audit[3435]: USER_START pid=3435 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:22.926000 audit[3439]: CRED_ACQ pid=3439 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:23.082938 sshd[3435]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:23.083000 audit[3435]: USER_END pid=3435 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:23.083000 audit[3435]: CRED_DISP pid=3435 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:23.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.25:22-10.0.0.1:46554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:23.087556 systemd[1]: Started sshd@11-10.0.0.25:22-10.0.0.1:46554.service. Dec 13 13:58:23.091963 systemd[1]: sshd@10-10.0.0.25:22-10.0.0.1:46540.service: Deactivated successfully. Dec 13 13:58:23.092697 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 13:58:23.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.25:22-10.0.0.1:46540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:23.097522 systemd-logind[1210]: Session 11 logged out. Waiting for processes to exit. Dec 13 13:58:23.099770 systemd-logind[1210]: Removed session 11. Dec 13 13:58:23.137000 audit[3447]: USER_ACCT pid=3447 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:23.139112 sshd[3447]: Accepted publickey for core from 10.0.0.1 port 46554 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:23.138000 audit[3447]: CRED_ACQ pid=3447 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:23.139000 audit[3447]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcdc1f920 a2=3 a3=1 items=0 ppid=1 pid=3447 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:23.139000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:23.140814 sshd[3447]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:23.144541 systemd-logind[1210]: New session 12 of user core. Dec 13 13:58:23.145015 systemd[1]: Started session-12.scope. Dec 13 13:58:23.147000 audit[3447]: USER_START pid=3447 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:23.148000 audit[3450]: CRED_ACQ pid=3450 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:23.278259 sshd[3447]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:23.277000 audit[3447]: USER_END pid=3447 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:23.277000 audit[3447]: CRED_DISP pid=3447 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:23.280719 systemd-logind[1210]: Session 12 logged out. Waiting for processes to exit. Dec 13 13:58:23.280863 systemd[1]: sshd@11-10.0.0.25:22-10.0.0.1:46554.service: Deactivated successfully. Dec 13 13:58:23.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.25:22-10.0.0.1:46554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:23.281529 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 13:58:23.282168 systemd-logind[1210]: Removed session 12. Dec 13 13:58:25.699233 env[1222]: time="2024-12-13T13:58:25.699185406Z" level=info msg="StopPodSandbox for \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\"" Dec 13 13:58:25.699844 env[1222]: time="2024-12-13T13:58:25.699804830Z" level=info msg="StopPodSandbox for \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\"" Dec 13 13:58:26.013609 env[1222]: 2024-12-13 13:58:25.830 [INFO][3504] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Dec 13 13:58:26.013609 env[1222]: 2024-12-13 13:58:25.831 [INFO][3504] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" iface="eth0" netns="/var/run/netns/cni-91bd1709-6d09-df31-3d33-01fb0e8e5c9c" Dec 13 13:58:26.013609 env[1222]: 2024-12-13 13:58:25.832 [INFO][3504] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" iface="eth0" netns="/var/run/netns/cni-91bd1709-6d09-df31-3d33-01fb0e8e5c9c" Dec 13 13:58:26.013609 env[1222]: 2024-12-13 13:58:25.832 [INFO][3504] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" iface="eth0" netns="/var/run/netns/cni-91bd1709-6d09-df31-3d33-01fb0e8e5c9c" Dec 13 13:58:26.013609 env[1222]: 2024-12-13 13:58:25.832 [INFO][3504] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Dec 13 13:58:26.013609 env[1222]: 2024-12-13 13:58:25.833 [INFO][3504] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Dec 13 13:58:26.013609 env[1222]: 2024-12-13 13:58:25.996 [INFO][3520] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" HandleID="k8s-pod-network.70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Workload="localhost-k8s-coredns--76f75df574--n5nx7-eth0" Dec 13 13:58:26.013609 env[1222]: 2024-12-13 13:58:25.996 [INFO][3520] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:26.013609 env[1222]: 2024-12-13 13:58:25.996 [INFO][3520] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:26.013609 env[1222]: 2024-12-13 13:58:26.005 [WARNING][3520] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" HandleID="k8s-pod-network.70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Workload="localhost-k8s-coredns--76f75df574--n5nx7-eth0" Dec 13 13:58:26.013609 env[1222]: 2024-12-13 13:58:26.005 [INFO][3520] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" HandleID="k8s-pod-network.70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Workload="localhost-k8s-coredns--76f75df574--n5nx7-eth0" Dec 13 13:58:26.013609 env[1222]: 2024-12-13 13:58:26.006 [INFO][3520] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:26.013609 env[1222]: 2024-12-13 13:58:26.008 [INFO][3504] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Dec 13 13:58:26.014370 env[1222]: time="2024-12-13T13:58:26.014329983Z" level=info msg="TearDown network for sandbox \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\" successfully" Dec 13 13:58:26.014476 env[1222]: time="2024-12-13T13:58:26.014445554Z" level=info msg="StopPodSandbox for \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\" returns successfully" Dec 13 13:58:26.014871 kubelet[2074]: E1213 13:58:26.014848 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:26.015573 env[1222]: time="2024-12-13T13:58:26.015478137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-n5nx7,Uid:7240c606-a927-478a-a105-0915e83b4114,Namespace:kube-system,Attempt:1,}" Dec 13 13:58:26.016281 systemd[1]: run-netns-cni\x2d91bd1709\x2d6d09\x2ddf31\x2d3d33\x2d01fb0e8e5c9c.mount: Deactivated successfully. Dec 13 13:58:26.023113 env[1222]: 2024-12-13 13:58:25.831 [INFO][3505] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Dec 13 13:58:26.023113 env[1222]: 2024-12-13 13:58:25.831 [INFO][3505] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" iface="eth0" netns="/var/run/netns/cni-01903954-10cf-295b-9c04-ad22500a89c6" Dec 13 13:58:26.023113 env[1222]: 2024-12-13 13:58:25.832 [INFO][3505] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" iface="eth0" netns="/var/run/netns/cni-01903954-10cf-295b-9c04-ad22500a89c6" Dec 13 13:58:26.023113 env[1222]: 2024-12-13 13:58:25.832 [INFO][3505] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" iface="eth0" netns="/var/run/netns/cni-01903954-10cf-295b-9c04-ad22500a89c6" Dec 13 13:58:26.023113 env[1222]: 2024-12-13 13:58:25.832 [INFO][3505] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Dec 13 13:58:26.023113 env[1222]: 2024-12-13 13:58:25.833 [INFO][3505] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Dec 13 13:58:26.023113 env[1222]: 2024-12-13 13:58:25.996 [INFO][3519] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" HandleID="k8s-pod-network.dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Workload="localhost-k8s-csi--node--driver--674z4-eth0" Dec 13 13:58:26.023113 env[1222]: 2024-12-13 13:58:25.996 [INFO][3519] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:26.023113 env[1222]: 2024-12-13 13:58:26.006 [INFO][3519] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:26.023113 env[1222]: 2024-12-13 13:58:26.017 [WARNING][3519] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" HandleID="k8s-pod-network.dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Workload="localhost-k8s-csi--node--driver--674z4-eth0" Dec 13 13:58:26.023113 env[1222]: 2024-12-13 13:58:26.017 [INFO][3519] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" HandleID="k8s-pod-network.dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Workload="localhost-k8s-csi--node--driver--674z4-eth0" Dec 13 13:58:26.023113 env[1222]: 2024-12-13 13:58:26.019 [INFO][3519] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:26.023113 env[1222]: 2024-12-13 13:58:26.021 [INFO][3505] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Dec 13 13:58:26.023645 env[1222]: time="2024-12-13T13:58:26.023616989Z" level=info msg="TearDown network for sandbox \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\" successfully" Dec 13 13:58:26.023731 env[1222]: time="2024-12-13T13:58:26.023713439Z" level=info msg="StopPodSandbox for \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\" returns successfully" Dec 13 13:58:26.024342 env[1222]: time="2024-12-13T13:58:26.024311699Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-674z4,Uid:5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa,Namespace:calico-system,Attempt:1,}" Dec 13 13:58:26.025393 systemd[1]: run-netns-cni\x2d01903954\x2d10cf\x2d295b\x2d9c04\x2dad22500a89c6.mount: Deactivated successfully. Dec 13 13:58:26.172863 systemd-networkd[1055]: cali8c697285bb0: Link UP Dec 13 13:58:26.178809 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 13:58:26.178911 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8c697285bb0: link becomes ready Dec 13 13:58:26.179415 systemd-networkd[1055]: cali8c697285bb0: Gained carrier Dec 13 13:58:26.193423 env[1222]: 2024-12-13 13:58:26.078 [INFO][3538] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--n5nx7-eth0 coredns-76f75df574- kube-system 7240c606-a927-478a-a105-0915e83b4114 918 0 2024-12-13 13:57:56 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-n5nx7 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali8c697285bb0 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647" Namespace="kube-system" Pod="coredns-76f75df574-n5nx7" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--n5nx7-" Dec 13 13:58:26.193423 env[1222]: 2024-12-13 13:58:26.078 [INFO][3538] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647" Namespace="kube-system" Pod="coredns-76f75df574-n5nx7" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--n5nx7-eth0" Dec 13 13:58:26.193423 env[1222]: 2024-12-13 13:58:26.105 [INFO][3567] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647" HandleID="k8s-pod-network.fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647" Workload="localhost-k8s-coredns--76f75df574--n5nx7-eth0" Dec 13 13:58:26.193423 env[1222]: 2024-12-13 13:58:26.119 [INFO][3567] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647" HandleID="k8s-pod-network.fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647" Workload="localhost-k8s-coredns--76f75df574--n5nx7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002785d0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-n5nx7", "timestamp":"2024-12-13 13:58:26.105898358 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 13:58:26.193423 env[1222]: 2024-12-13 13:58:26.119 [INFO][3567] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:26.193423 env[1222]: 2024-12-13 13:58:26.119 [INFO][3567] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:26.193423 env[1222]: 2024-12-13 13:58:26.119 [INFO][3567] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 13:58:26.193423 env[1222]: 2024-12-13 13:58:26.124 [INFO][3567] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647" host="localhost" Dec 13 13:58:26.193423 env[1222]: 2024-12-13 13:58:26.132 [INFO][3567] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 13:58:26.193423 env[1222]: 2024-12-13 13:58:26.136 [INFO][3567] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 13:58:26.193423 env[1222]: 2024-12-13 13:58:26.142 [INFO][3567] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 13:58:26.193423 env[1222]: 2024-12-13 13:58:26.144 [INFO][3567] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 13:58:26.193423 env[1222]: 2024-12-13 13:58:26.144 [INFO][3567] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647" host="localhost" Dec 13 13:58:26.193423 env[1222]: 2024-12-13 13:58:26.145 [INFO][3567] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647 Dec 13 13:58:26.193423 env[1222]: 2024-12-13 13:58:26.149 [INFO][3567] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647" host="localhost" Dec 13 13:58:26.193423 env[1222]: 2024-12-13 13:58:26.160 [INFO][3567] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647" host="localhost" Dec 13 13:58:26.193423 env[1222]: 2024-12-13 13:58:26.160 [INFO][3567] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647" host="localhost" Dec 13 13:58:26.193423 env[1222]: 2024-12-13 13:58:26.160 [INFO][3567] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:26.193423 env[1222]: 2024-12-13 13:58:26.160 [INFO][3567] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647" HandleID="k8s-pod-network.fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647" Workload="localhost-k8s-coredns--76f75df574--n5nx7-eth0" Dec 13 13:58:26.194008 env[1222]: 2024-12-13 13:58:26.161 [INFO][3538] cni-plugin/k8s.go 386: Populated endpoint ContainerID="fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647" Namespace="kube-system" Pod="coredns-76f75df574-n5nx7" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--n5nx7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--n5nx7-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"7240c606-a927-478a-a105-0915e83b4114", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 57, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-n5nx7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8c697285bb0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:26.194008 env[1222]: 2024-12-13 13:58:26.162 [INFO][3538] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647" Namespace="kube-system" Pod="coredns-76f75df574-n5nx7" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--n5nx7-eth0" Dec 13 13:58:26.194008 env[1222]: 2024-12-13 13:58:26.162 [INFO][3538] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8c697285bb0 ContainerID="fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647" Namespace="kube-system" Pod="coredns-76f75df574-n5nx7" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--n5nx7-eth0" Dec 13 13:58:26.194008 env[1222]: 2024-12-13 13:58:26.179 [INFO][3538] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647" Namespace="kube-system" Pod="coredns-76f75df574-n5nx7" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--n5nx7-eth0" Dec 13 13:58:26.194008 env[1222]: 2024-12-13 13:58:26.179 [INFO][3538] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647" Namespace="kube-system" Pod="coredns-76f75df574-n5nx7" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--n5nx7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--n5nx7-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"7240c606-a927-478a-a105-0915e83b4114", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 57, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647", Pod:"coredns-76f75df574-n5nx7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8c697285bb0", MAC:"3e:4f:19:bc:ba:10", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:26.194008 env[1222]: 2024-12-13 13:58:26.189 [INFO][3538] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647" Namespace="kube-system" Pod="coredns-76f75df574-n5nx7" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--n5nx7-eth0" Dec 13 13:58:26.197095 systemd-networkd[1055]: calif443f41f95a: Link UP Dec 13 13:58:26.198834 systemd-networkd[1055]: calif443f41f95a: Gained carrier Dec 13 13:58:26.199482 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif443f41f95a: link becomes ready Dec 13 13:58:26.204000 audit[3594]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3594 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:58:26.204000 audit[3594]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=fffff435e000 a2=0 a3=ffff8a304fa8 items=0 ppid=3232 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.204000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:58:26.213587 env[1222]: 2024-12-13 13:58:26.074 [INFO][3533] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--674z4-eth0 csi-node-driver- calico-system 5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa 917 0 2024-12-13 13:58:04 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-674z4 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calif443f41f95a [] []}} ContainerID="b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de" Namespace="calico-system" Pod="csi-node-driver-674z4" WorkloadEndpoint="localhost-k8s-csi--node--driver--674z4-" Dec 13 13:58:26.213587 env[1222]: 2024-12-13 13:58:26.074 [INFO][3533] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de" Namespace="calico-system" Pod="csi-node-driver-674z4" WorkloadEndpoint="localhost-k8s-csi--node--driver--674z4-eth0" Dec 13 13:58:26.213587 env[1222]: 2024-12-13 13:58:26.105 [INFO][3562] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de" HandleID="k8s-pod-network.b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de" Workload="localhost-k8s-csi--node--driver--674z4-eth0" Dec 13 13:58:26.213587 env[1222]: 2024-12-13 13:58:26.119 [INFO][3562] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de" HandleID="k8s-pod-network.b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de" Workload="localhost-k8s-csi--node--driver--674z4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002f2dc0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-674z4", "timestamp":"2024-12-13 13:58:26.105593648 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 13:58:26.213587 env[1222]: 2024-12-13 13:58:26.119 [INFO][3562] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:26.213587 env[1222]: 2024-12-13 13:58:26.160 [INFO][3562] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:26.213587 env[1222]: 2024-12-13 13:58:26.160 [INFO][3562] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 13:58:26.213587 env[1222]: 2024-12-13 13:58:26.162 [INFO][3562] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de" host="localhost" Dec 13 13:58:26.213587 env[1222]: 2024-12-13 13:58:26.168 [INFO][3562] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 13:58:26.213587 env[1222]: 2024-12-13 13:58:26.176 [INFO][3562] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 13:58:26.213587 env[1222]: 2024-12-13 13:58:26.178 [INFO][3562] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 13:58:26.213587 env[1222]: 2024-12-13 13:58:26.181 [INFO][3562] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 13:58:26.213587 env[1222]: 2024-12-13 13:58:26.181 [INFO][3562] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de" host="localhost" Dec 13 13:58:26.213587 env[1222]: 2024-12-13 13:58:26.182 [INFO][3562] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de Dec 13 13:58:26.213587 env[1222]: 2024-12-13 13:58:26.185 [INFO][3562] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de" host="localhost" Dec 13 13:58:26.213587 env[1222]: 2024-12-13 13:58:26.191 [INFO][3562] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de" host="localhost" Dec 13 13:58:26.213587 env[1222]: 2024-12-13 13:58:26.191 [INFO][3562] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de" host="localhost" Dec 13 13:58:26.213587 env[1222]: 2024-12-13 13:58:26.191 [INFO][3562] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:26.213587 env[1222]: 2024-12-13 13:58:26.191 [INFO][3562] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de" HandleID="k8s-pod-network.b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de" Workload="localhost-k8s-csi--node--driver--674z4-eth0" Dec 13 13:58:26.214145 env[1222]: 2024-12-13 13:58:26.194 [INFO][3533] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de" Namespace="calico-system" Pod="csi-node-driver-674z4" WorkloadEndpoint="localhost-k8s-csi--node--driver--674z4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--674z4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa", ResourceVersion:"917", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-674z4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif443f41f95a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:26.214145 env[1222]: 2024-12-13 13:58:26.194 [INFO][3533] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de" Namespace="calico-system" Pod="csi-node-driver-674z4" WorkloadEndpoint="localhost-k8s-csi--node--driver--674z4-eth0" Dec 13 13:58:26.214145 env[1222]: 2024-12-13 13:58:26.194 [INFO][3533] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif443f41f95a ContainerID="b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de" Namespace="calico-system" Pod="csi-node-driver-674z4" WorkloadEndpoint="localhost-k8s-csi--node--driver--674z4-eth0" Dec 13 13:58:26.214145 env[1222]: 2024-12-13 13:58:26.199 [INFO][3533] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de" Namespace="calico-system" Pod="csi-node-driver-674z4" WorkloadEndpoint="localhost-k8s-csi--node--driver--674z4-eth0" Dec 13 13:58:26.214145 env[1222]: 2024-12-13 13:58:26.199 [INFO][3533] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de" Namespace="calico-system" Pod="csi-node-driver-674z4" WorkloadEndpoint="localhost-k8s-csi--node--driver--674z4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--674z4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa", ResourceVersion:"917", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de", Pod:"csi-node-driver-674z4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif443f41f95a", MAC:"32:b0:85:85:61:d4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:26.214145 env[1222]: 2024-12-13 13:58:26.208 [INFO][3533] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de" Namespace="calico-system" Pod="csi-node-driver-674z4" WorkloadEndpoint="localhost-k8s-csi--node--driver--674z4-eth0" Dec 13 13:58:26.219388 env[1222]: time="2024-12-13T13:58:26.217681390Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:58:26.219388 env[1222]: time="2024-12-13T13:58:26.217742196Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:58:26.219388 env[1222]: time="2024-12-13T13:58:26.217751997Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:58:26.219388 env[1222]: time="2024-12-13T13:58:26.218015824Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647 pid=3608 runtime=io.containerd.runc.v2 Dec 13 13:58:26.228000 audit[3631]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3631 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:58:26.228000 audit[3631]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20336 a0=3 a1=fffffc4469a0 a2=0 a3=ffffbe48ffa8 items=0 ppid=3232 pid=3631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.228000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:58:26.231880 systemd[1]: Started cri-containerd-fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647.scope. Dec 13 13:58:26.239294 env[1222]: time="2024-12-13T13:58:26.239153693Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:58:26.239294 env[1222]: time="2024-12-13T13:58:26.239211818Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:58:26.239294 env[1222]: time="2024-12-13T13:58:26.239222619Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:58:26.239711 env[1222]: time="2024-12-13T13:58:26.239429960Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de pid=3641 runtime=io.containerd.runc.v2 Dec 13 13:58:26.248739 systemd[1]: Started cri-containerd-b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de.scope. Dec 13 13:58:26.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.258000 audit: BPF prog-id=155 op=LOAD Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3608 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662346334363562393166386366363238616534376664366332313534 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3608 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662346334363562393166386366363238616534376664366332313534 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit: BPF prog-id=156 op=LOAD Dec 13 13:58:26.259000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3608 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662346334363562393166386366363238616534376664366332313534 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit: BPF prog-id=157 op=LOAD Dec 13 13:58:26.259000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3608 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662346334363562393166386366363238616534376664366332313534 Dec 13 13:58:26.259000 audit: BPF prog-id=157 op=UNLOAD Dec 13 13:58:26.259000 audit: BPF prog-id=156 op=UNLOAD Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { perfmon } for pid=3624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit[3624]: AVC avc: denied { bpf } for pid=3624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.259000 audit: BPF prog-id=158 op=LOAD Dec 13 13:58:26.259000 audit[3624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3608 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662346334363562393166386366363238616534376664366332313534 Dec 13 13:58:26.262157 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 13:58:26.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.270000 audit: BPF prog-id=159 op=LOAD Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3641 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233303962383466646431376639346463333462386165663363633863 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3641 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233303962383466646431376639346463333462386165663363633863 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit: BPF prog-id=160 op=LOAD Dec 13 13:58:26.276000 audit[3655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3641 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233303962383466646431376639346463333462386165663363633863 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit: BPF prog-id=161 op=LOAD Dec 13 13:58:26.276000 audit[3655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3641 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233303962383466646431376639346463333462386165663363633863 Dec 13 13:58:26.276000 audit: BPF prog-id=161 op=UNLOAD Dec 13 13:58:26.276000 audit: BPF prog-id=160 op=UNLOAD Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { perfmon } for pid=3655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit[3655]: AVC avc: denied { bpf } for pid=3655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.276000 audit: BPF prog-id=162 op=LOAD Dec 13 13:58:26.276000 audit[3655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3641 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233303962383466646431376639346463333462386165663363633863 Dec 13 13:58:26.277813 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 13:58:26.287624 env[1222]: time="2024-12-13T13:58:26.287584084Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-n5nx7,Uid:7240c606-a927-478a-a105-0915e83b4114,Namespace:kube-system,Attempt:1,} returns sandbox id \"fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647\"" Dec 13 13:58:26.289034 env[1222]: time="2024-12-13T13:58:26.287828109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-674z4,Uid:5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa,Namespace:calico-system,Attempt:1,} returns sandbox id \"b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de\"" Dec 13 13:58:26.289849 kubelet[2074]: E1213 13:58:26.289349 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:26.291443 env[1222]: time="2024-12-13T13:58:26.291069632Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 13:58:26.293561 env[1222]: time="2024-12-13T13:58:26.293526357Z" level=info msg="CreateContainer within sandbox \"fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 13:58:26.307329 env[1222]: time="2024-12-13T13:58:26.307282209Z" level=info msg="CreateContainer within sandbox \"fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"1cd1da23afc82a48d90896e93d4a4841650ffff2ac2d77992581ea8879bab248\"" Dec 13 13:58:26.308149 env[1222]: time="2024-12-13T13:58:26.308122093Z" level=info msg="StartContainer for \"1cd1da23afc82a48d90896e93d4a4841650ffff2ac2d77992581ea8879bab248\"" Dec 13 13:58:26.322469 systemd[1]: Started cri-containerd-1cd1da23afc82a48d90896e93d4a4841650ffff2ac2d77992581ea8879bab248.scope. Dec 13 13:58:26.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit: BPF prog-id=163 op=LOAD Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3608 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163643164613233616663383261343864393038393665393364346134 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3608 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163643164613233616663383261343864393038393665393364346134 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit: BPF prog-id=164 op=LOAD Dec 13 13:58:26.352000 audit[3698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3608 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163643164613233616663383261343864393038393665393364346134 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit: BPF prog-id=165 op=LOAD Dec 13 13:58:26.352000 audit[3698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3608 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163643164613233616663383261343864393038393665393364346134 Dec 13 13:58:26.352000 audit: BPF prog-id=165 op=UNLOAD Dec 13 13:58:26.352000 audit: BPF prog-id=164 op=UNLOAD Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:26.352000 audit: BPF prog-id=166 op=LOAD Dec 13 13:58:26.352000 audit[3698]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3608 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163643164613233616663383261343864393038393665393364346134 Dec 13 13:58:26.364562 env[1222]: time="2024-12-13T13:58:26.364466634Z" level=info msg="StartContainer for \"1cd1da23afc82a48d90896e93d4a4841650ffff2ac2d77992581ea8879bab248\" returns successfully" Dec 13 13:58:26.699020 env[1222]: time="2024-12-13T13:58:26.698900360Z" level=info msg="StopPodSandbox for \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\"" Dec 13 13:58:26.788105 env[1222]: 2024-12-13 13:58:26.751 [INFO][3746] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Dec 13 13:58:26.788105 env[1222]: 2024-12-13 13:58:26.751 [INFO][3746] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" iface="eth0" netns="/var/run/netns/cni-6d64ccb3-2af2-3790-a94c-3e35cf7bcce2" Dec 13 13:58:26.788105 env[1222]: 2024-12-13 13:58:26.752 [INFO][3746] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" iface="eth0" netns="/var/run/netns/cni-6d64ccb3-2af2-3790-a94c-3e35cf7bcce2" Dec 13 13:58:26.788105 env[1222]: 2024-12-13 13:58:26.752 [INFO][3746] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" iface="eth0" netns="/var/run/netns/cni-6d64ccb3-2af2-3790-a94c-3e35cf7bcce2" Dec 13 13:58:26.788105 env[1222]: 2024-12-13 13:58:26.752 [INFO][3746] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Dec 13 13:58:26.788105 env[1222]: 2024-12-13 13:58:26.752 [INFO][3746] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Dec 13 13:58:26.788105 env[1222]: 2024-12-13 13:58:26.772 [INFO][3753] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" HandleID="k8s-pod-network.5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Workload="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0" Dec 13 13:58:26.788105 env[1222]: 2024-12-13 13:58:26.772 [INFO][3753] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:26.788105 env[1222]: 2024-12-13 13:58:26.772 [INFO][3753] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:26.788105 env[1222]: 2024-12-13 13:58:26.781 [WARNING][3753] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" HandleID="k8s-pod-network.5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Workload="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0" Dec 13 13:58:26.788105 env[1222]: 2024-12-13 13:58:26.781 [INFO][3753] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" HandleID="k8s-pod-network.5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Workload="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0" Dec 13 13:58:26.788105 env[1222]: 2024-12-13 13:58:26.784 [INFO][3753] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:26.788105 env[1222]: 2024-12-13 13:58:26.786 [INFO][3746] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Dec 13 13:58:26.788910 env[1222]: time="2024-12-13T13:58:26.788874816Z" level=info msg="TearDown network for sandbox \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\" successfully" Dec 13 13:58:26.788998 env[1222]: time="2024-12-13T13:58:26.788971226Z" level=info msg="StopPodSandbox for \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\" returns successfully" Dec 13 13:58:26.789949 env[1222]: time="2024-12-13T13:58:26.789909399Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bcd7c76ff-25fc7,Uid:07ffb936-3e31-41ba-bf8f-d41af42cec36,Namespace:calico-system,Attempt:1,}" Dec 13 13:58:26.844485 kubelet[2074]: E1213 13:58:26.844435 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:26.863472 kubelet[2074]: I1213 13:58:26.863255 2074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-n5nx7" podStartSLOduration=30.863214552 podStartE2EDuration="30.863214552s" podCreationTimestamp="2024-12-13 13:57:56 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 13:58:26.856839436 +0000 UTC m=+44.302796655" watchObservedRunningTime="2024-12-13 13:58:26.863214552 +0000 UTC m=+44.309171771" Dec 13 13:58:26.869000 audit[3782]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=3782 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:26.869000 audit[3782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc0f930d0 a2=0 a3=1 items=0 ppid=2234 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.869000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:26.877000 audit[3782]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=3782 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:26.877000 audit[3782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffc0f930d0 a2=0 a3=1 items=0 ppid=2234 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.877000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:26.889000 audit[3785]: NETFILTER_CFG table=filter:105 family=2 entries=13 op=nft_register_rule pid=3785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:26.889000 audit[3785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd6feade0 a2=0 a3=1 items=0 ppid=2234 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.889000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:26.894000 audit[3785]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=3785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:26.894000 audit[3785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffd6feade0 a2=0 a3=1 items=0 ppid=2234 pid=3785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.894000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:26.931375 systemd-networkd[1055]: cali16773194782: Link UP Dec 13 13:58:26.932808 systemd-networkd[1055]: cali16773194782: Gained carrier Dec 13 13:58:26.933464 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali16773194782: link becomes ready Dec 13 13:58:26.945572 env[1222]: 2024-12-13 13:58:26.839 [INFO][3762] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0 calico-kube-controllers-6bcd7c76ff- calico-system 07ffb936-3e31-41ba-bf8f-d41af42cec36 934 0 2024-12-13 13:58:04 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6bcd7c76ff projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-6bcd7c76ff-25fc7 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali16773194782 [] []}} ContainerID="8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816" Namespace="calico-system" Pod="calico-kube-controllers-6bcd7c76ff-25fc7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-" Dec 13 13:58:26.945572 env[1222]: 2024-12-13 13:58:26.839 [INFO][3762] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816" Namespace="calico-system" Pod="calico-kube-controllers-6bcd7c76ff-25fc7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0" Dec 13 13:58:26.945572 env[1222]: 2024-12-13 13:58:26.887 [INFO][3775] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816" HandleID="k8s-pod-network.8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816" Workload="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0" Dec 13 13:58:26.945572 env[1222]: 2024-12-13 13:58:26.899 [INFO][3775] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816" HandleID="k8s-pod-network.8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816" Workload="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003cb250), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-6bcd7c76ff-25fc7", "timestamp":"2024-12-13 13:58:26.887212347 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 13:58:26.945572 env[1222]: 2024-12-13 13:58:26.900 [INFO][3775] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:26.945572 env[1222]: 2024-12-13 13:58:26.900 [INFO][3775] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:26.945572 env[1222]: 2024-12-13 13:58:26.900 [INFO][3775] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 13:58:26.945572 env[1222]: 2024-12-13 13:58:26.902 [INFO][3775] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816" host="localhost" Dec 13 13:58:26.945572 env[1222]: 2024-12-13 13:58:26.907 [INFO][3775] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 13:58:26.945572 env[1222]: 2024-12-13 13:58:26.911 [INFO][3775] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 13:58:26.945572 env[1222]: 2024-12-13 13:58:26.913 [INFO][3775] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 13:58:26.945572 env[1222]: 2024-12-13 13:58:26.915 [INFO][3775] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 13:58:26.945572 env[1222]: 2024-12-13 13:58:26.916 [INFO][3775] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816" host="localhost" Dec 13 13:58:26.945572 env[1222]: 2024-12-13 13:58:26.917 [INFO][3775] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816 Dec 13 13:58:26.945572 env[1222]: 2024-12-13 13:58:26.921 [INFO][3775] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816" host="localhost" Dec 13 13:58:26.945572 env[1222]: 2024-12-13 13:58:26.926 [INFO][3775] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816" host="localhost" Dec 13 13:58:26.945572 env[1222]: 2024-12-13 13:58:26.926 [INFO][3775] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816" host="localhost" Dec 13 13:58:26.945572 env[1222]: 2024-12-13 13:58:26.926 [INFO][3775] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:26.945572 env[1222]: 2024-12-13 13:58:26.927 [INFO][3775] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816" HandleID="k8s-pod-network.8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816" Workload="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0" Dec 13 13:58:26.946172 env[1222]: 2024-12-13 13:58:26.929 [INFO][3762] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816" Namespace="calico-system" Pod="calico-kube-controllers-6bcd7c76ff-25fc7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0", GenerateName:"calico-kube-controllers-6bcd7c76ff-", Namespace:"calico-system", SelfLink:"", UID:"07ffb936-3e31-41ba-bf8f-d41af42cec36", ResourceVersion:"934", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bcd7c76ff", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-6bcd7c76ff-25fc7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali16773194782", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:26.946172 env[1222]: 2024-12-13 13:58:26.929 [INFO][3762] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816" Namespace="calico-system" Pod="calico-kube-controllers-6bcd7c76ff-25fc7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0" Dec 13 13:58:26.946172 env[1222]: 2024-12-13 13:58:26.929 [INFO][3762] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali16773194782 ContainerID="8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816" Namespace="calico-system" Pod="calico-kube-controllers-6bcd7c76ff-25fc7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0" Dec 13 13:58:26.946172 env[1222]: 2024-12-13 13:58:26.933 [INFO][3762] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816" Namespace="calico-system" Pod="calico-kube-controllers-6bcd7c76ff-25fc7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0" Dec 13 13:58:26.946172 env[1222]: 2024-12-13 13:58:26.934 [INFO][3762] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816" Namespace="calico-system" Pod="calico-kube-controllers-6bcd7c76ff-25fc7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0", GenerateName:"calico-kube-controllers-6bcd7c76ff-", Namespace:"calico-system", SelfLink:"", UID:"07ffb936-3e31-41ba-bf8f-d41af42cec36", ResourceVersion:"934", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bcd7c76ff", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816", Pod:"calico-kube-controllers-6bcd7c76ff-25fc7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali16773194782", MAC:"f6:1f:a5:a2:55:f0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:26.946172 env[1222]: 2024-12-13 13:58:26.942 [INFO][3762] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816" Namespace="calico-system" Pod="calico-kube-controllers-6bcd7c76ff-25fc7" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0" Dec 13 13:58:26.951000 audit[3803]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=3803 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:58:26.951000 audit[3803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19828 a0=3 a1=ffffc4349f50 a2=0 a3=ffff9ac4afa8 items=0 ppid=3232 pid=3803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.951000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:58:26.957849 env[1222]: time="2024-12-13T13:58:26.957781387Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:58:26.957965 env[1222]: time="2024-12-13T13:58:26.957832952Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:58:26.957965 env[1222]: time="2024-12-13T13:58:26.957843593Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:58:26.958076 env[1222]: time="2024-12-13T13:58:26.958010050Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816 pid=3811 runtime=io.containerd.runc.v2 Dec 13 13:58:26.968523 systemd[1]: Started cri-containerd-8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816.scope. Dec 13 13:58:27.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.001000 audit: BPF prog-id=167 op=LOAD Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3811 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:27.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866366337393166353861343431643935633137666163363435323665 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3811 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:27.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866366337393166353861343431643935633137666163363435323665 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit: BPF prog-id=168 op=LOAD Dec 13 13:58:27.002000 audit[3820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3811 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:27.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866366337393166353861343431643935633137666163363435323665 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit: BPF prog-id=169 op=LOAD Dec 13 13:58:27.002000 audit[3820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3811 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:27.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866366337393166353861343431643935633137666163363435323665 Dec 13 13:58:27.002000 audit: BPF prog-id=169 op=UNLOAD Dec 13 13:58:27.002000 audit: BPF prog-id=168 op=UNLOAD Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { perfmon } for pid=3820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit[3820]: AVC avc: denied { bpf } for pid=3820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.002000 audit: BPF prog-id=170 op=LOAD Dec 13 13:58:27.002000 audit[3820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3811 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:27.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866366337393166353861343431643935633137666163363435323665 Dec 13 13:58:27.008234 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 13:58:27.019031 systemd[1]: run-netns-cni\x2d6d64ccb3\x2d2af2\x2d3790\x2da94c\x2d3e35cf7bcce2.mount: Deactivated successfully. Dec 13 13:58:27.030776 env[1222]: time="2024-12-13T13:58:27.030736960Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bcd7c76ff-25fc7,Uid:07ffb936-3e31-41ba-bf8f-d41af42cec36,Namespace:calico-system,Attempt:1,} returns sandbox id \"8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816\"" Dec 13 13:58:27.213619 kubelet[2074]: I1213 13:58:27.213527 2074 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 13:58:27.214271 kubelet[2074]: E1213 13:58:27.214257 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:27.463199 env[1222]: time="2024-12-13T13:58:27.463142563Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:27.464602 env[1222]: time="2024-12-13T13:58:27.464524218Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:27.465727 env[1222]: time="2024-12-13T13:58:27.465698893Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:27.467187 env[1222]: time="2024-12-13T13:58:27.467161915Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:27.467586 env[1222]: time="2024-12-13T13:58:27.467558514Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163\"" Dec 13 13:58:27.468507 env[1222]: time="2024-12-13T13:58:27.468478164Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 13:58:27.470847 env[1222]: time="2024-12-13T13:58:27.470815552Z" level=info msg="CreateContainer within sandbox \"b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 13:58:27.486361 env[1222]: time="2024-12-13T13:58:27.486316185Z" level=info msg="CreateContainer within sandbox \"b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"426adb62570e3a80ad017d7645ca49cf2c58513c023240056f39a8c11a175871\"" Dec 13 13:58:27.487083 env[1222]: time="2024-12-13T13:58:27.487033015Z" level=info msg="StartContainer for \"426adb62570e3a80ad017d7645ca49cf2c58513c023240056f39a8c11a175871\"" Dec 13 13:58:27.503223 systemd[1]: Started cri-containerd-426adb62570e3a80ad017d7645ca49cf2c58513c023240056f39a8c11a175871.scope. Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3641 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:27.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432366164623632353730653361383061643031376437363435636134 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit: BPF prog-id=171 op=LOAD Dec 13 13:58:27.523000 audit[3900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3641 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:27.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432366164623632353730653361383061643031376437363435636134 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit: BPF prog-id=172 op=LOAD Dec 13 13:58:27.523000 audit[3900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3641 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:27.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432366164623632353730653361383061643031376437363435636134 Dec 13 13:58:27.523000 audit: BPF prog-id=172 op=UNLOAD Dec 13 13:58:27.523000 audit: BPF prog-id=171 op=UNLOAD Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { perfmon } for pid=3900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit[3900]: AVC avc: denied { bpf } for pid=3900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.523000 audit: BPF prog-id=173 op=LOAD Dec 13 13:58:27.523000 audit[3900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3641 pid=3900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:27.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432366164623632353730653361383061643031376437363435636134 Dec 13 13:58:27.537884 env[1222]: time="2024-12-13T13:58:27.537753765Z" level=info msg="StartContainer for \"426adb62570e3a80ad017d7645ca49cf2c58513c023240056f39a8c11a175871\" returns successfully" Dec 13 13:58:27.573806 systemd-networkd[1055]: cali8c697285bb0: Gained IPv6LL Dec 13 13:58:27.699796 env[1222]: time="2024-12-13T13:58:27.699746056Z" level=info msg="StopPodSandbox for \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\"" Dec 13 13:58:27.779534 env[1222]: 2024-12-13 13:58:27.745 [INFO][3943] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Dec 13 13:58:27.779534 env[1222]: 2024-12-13 13:58:27.745 [INFO][3943] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" iface="eth0" netns="/var/run/netns/cni-48b5b211-e0c9-dff3-4999-b9e849fe6328" Dec 13 13:58:27.779534 env[1222]: 2024-12-13 13:58:27.745 [INFO][3943] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" iface="eth0" netns="/var/run/netns/cni-48b5b211-e0c9-dff3-4999-b9e849fe6328" Dec 13 13:58:27.779534 env[1222]: 2024-12-13 13:58:27.745 [INFO][3943] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" iface="eth0" netns="/var/run/netns/cni-48b5b211-e0c9-dff3-4999-b9e849fe6328" Dec 13 13:58:27.779534 env[1222]: 2024-12-13 13:58:27.745 [INFO][3943] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Dec 13 13:58:27.779534 env[1222]: 2024-12-13 13:58:27.745 [INFO][3943] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Dec 13 13:58:27.779534 env[1222]: 2024-12-13 13:58:27.764 [INFO][3951] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" HandleID="k8s-pod-network.99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Workload="localhost-k8s-coredns--76f75df574--79klx-eth0" Dec 13 13:58:27.779534 env[1222]: 2024-12-13 13:58:27.764 [INFO][3951] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:27.779534 env[1222]: 2024-12-13 13:58:27.764 [INFO][3951] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:27.779534 env[1222]: 2024-12-13 13:58:27.774 [WARNING][3951] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" HandleID="k8s-pod-network.99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Workload="localhost-k8s-coredns--76f75df574--79klx-eth0" Dec 13 13:58:27.779534 env[1222]: 2024-12-13 13:58:27.774 [INFO][3951] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" HandleID="k8s-pod-network.99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Workload="localhost-k8s-coredns--76f75df574--79klx-eth0" Dec 13 13:58:27.779534 env[1222]: 2024-12-13 13:58:27.775 [INFO][3951] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:27.779534 env[1222]: 2024-12-13 13:58:27.777 [INFO][3943] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Dec 13 13:58:27.779988 env[1222]: time="2024-12-13T13:58:27.779674537Z" level=info msg="TearDown network for sandbox \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\" successfully" Dec 13 13:58:27.779988 env[1222]: time="2024-12-13T13:58:27.779712981Z" level=info msg="StopPodSandbox for \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\" returns successfully" Dec 13 13:58:27.780270 kubelet[2074]: E1213 13:58:27.780248 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:27.780915 env[1222]: time="2024-12-13T13:58:27.780884655Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-79klx,Uid:27e8634a-86dc-4fd9-be3d-789a986b1796,Namespace:kube-system,Attempt:1,}" Dec 13 13:58:27.854625 kubelet[2074]: E1213 13:58:27.854548 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:27.883941 systemd-networkd[1055]: calid784a9021da: Link UP Dec 13 13:58:27.885634 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 13:58:27.885698 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid784a9021da: link becomes ready Dec 13 13:58:27.885810 systemd-networkd[1055]: calid784a9021da: Gained carrier Dec 13 13:58:27.899488 env[1222]: 2024-12-13 13:58:27.821 [INFO][3960] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--79klx-eth0 coredns-76f75df574- kube-system 27e8634a-86dc-4fd9-be3d-789a986b1796 961 0 2024-12-13 13:57:56 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-79klx eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid784a9021da [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda" Namespace="kube-system" Pod="coredns-76f75df574-79klx" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--79klx-" Dec 13 13:58:27.899488 env[1222]: 2024-12-13 13:58:27.821 [INFO][3960] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda" Namespace="kube-system" Pod="coredns-76f75df574-79klx" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--79klx-eth0" Dec 13 13:58:27.899488 env[1222]: 2024-12-13 13:58:27.845 [INFO][3973] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda" HandleID="k8s-pod-network.d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda" Workload="localhost-k8s-coredns--76f75df574--79klx-eth0" Dec 13 13:58:27.899488 env[1222]: 2024-12-13 13:58:27.857 [INFO][3973] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda" HandleID="k8s-pod-network.d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda" Workload="localhost-k8s-coredns--76f75df574--79klx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d9350), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-79klx", "timestamp":"2024-12-13 13:58:27.845876878 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 13:58:27.899488 env[1222]: 2024-12-13 13:58:27.857 [INFO][3973] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:27.899488 env[1222]: 2024-12-13 13:58:27.857 [INFO][3973] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:27.899488 env[1222]: 2024-12-13 13:58:27.857 [INFO][3973] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 13:58:27.899488 env[1222]: 2024-12-13 13:58:27.859 [INFO][3973] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda" host="localhost" Dec 13 13:58:27.899488 env[1222]: 2024-12-13 13:58:27.862 [INFO][3973] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 13:58:27.899488 env[1222]: 2024-12-13 13:58:27.866 [INFO][3973] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 13:58:27.899488 env[1222]: 2024-12-13 13:58:27.867 [INFO][3973] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 13:58:27.899488 env[1222]: 2024-12-13 13:58:27.870 [INFO][3973] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 13:58:27.899488 env[1222]: 2024-12-13 13:58:27.870 [INFO][3973] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda" host="localhost" Dec 13 13:58:27.899488 env[1222]: 2024-12-13 13:58:27.871 [INFO][3973] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda Dec 13 13:58:27.899488 env[1222]: 2024-12-13 13:58:27.875 [INFO][3973] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda" host="localhost" Dec 13 13:58:27.899488 env[1222]: 2024-12-13 13:58:27.879 [INFO][3973] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda" host="localhost" Dec 13 13:58:27.899488 env[1222]: 2024-12-13 13:58:27.879 [INFO][3973] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda" host="localhost" Dec 13 13:58:27.899488 env[1222]: 2024-12-13 13:58:27.879 [INFO][3973] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:27.899488 env[1222]: 2024-12-13 13:58:27.879 [INFO][3973] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda" HandleID="k8s-pod-network.d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda" Workload="localhost-k8s-coredns--76f75df574--79klx-eth0" Dec 13 13:58:27.900186 env[1222]: 2024-12-13 13:58:27.882 [INFO][3960] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda" Namespace="kube-system" Pod="coredns-76f75df574-79klx" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--79klx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--79klx-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"27e8634a-86dc-4fd9-be3d-789a986b1796", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 57, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-79klx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid784a9021da", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:27.900186 env[1222]: 2024-12-13 13:58:27.882 [INFO][3960] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda" Namespace="kube-system" Pod="coredns-76f75df574-79klx" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--79klx-eth0" Dec 13 13:58:27.900186 env[1222]: 2024-12-13 13:58:27.882 [INFO][3960] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid784a9021da ContainerID="d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda" Namespace="kube-system" Pod="coredns-76f75df574-79klx" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--79klx-eth0" Dec 13 13:58:27.900186 env[1222]: 2024-12-13 13:58:27.885 [INFO][3960] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda" Namespace="kube-system" Pod="coredns-76f75df574-79klx" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--79klx-eth0" Dec 13 13:58:27.900186 env[1222]: 2024-12-13 13:58:27.886 [INFO][3960] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda" Namespace="kube-system" Pod="coredns-76f75df574-79klx" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--79klx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--79klx-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"27e8634a-86dc-4fd9-be3d-789a986b1796", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 57, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda", Pod:"coredns-76f75df574-79klx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid784a9021da", MAC:"fa:24:b9:f8:e5:48", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:27.900186 env[1222]: 2024-12-13 13:58:27.894 [INFO][3960] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda" Namespace="kube-system" Pod="coredns-76f75df574-79klx" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--79klx-eth0" Dec 13 13:58:27.904000 audit[3995]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=3995 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:58:27.905750 kernel: kauditd_printk_skb: 315 callbacks suppressed Dec 13 13:58:27.905813 kernel: audit: type=1325 audit(1734098307.904:1236): table=filter:108 family=2 entries=38 op=nft_register_chain pid=3995 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:58:27.904000 audit[3995]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19408 a0=3 a1=ffffda241bd0 a2=0 a3=ffff8e440fa8 items=0 ppid=3232 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:27.911491 kernel: audit: type=1300 audit(1734098307.904:1236): arch=c00000b7 syscall=211 success=yes exit=19408 a0=3 a1=ffffda241bd0 a2=0 a3=ffff8e440fa8 items=0 ppid=3232 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:27.911558 kernel: audit: type=1327 audit(1734098307.904:1236): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:58:27.904000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:58:27.912539 env[1222]: time="2024-12-13T13:58:27.908676968Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:58:27.912539 env[1222]: time="2024-12-13T13:58:27.908727653Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:58:27.912539 env[1222]: time="2024-12-13T13:58:27.908737774Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:58:27.912539 env[1222]: time="2024-12-13T13:58:27.908896549Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda pid=4003 runtime=io.containerd.runc.v2 Dec 13 13:58:27.923957 systemd[1]: Started cri-containerd-d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda.scope. Dec 13 13:58:27.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.947172 kernel: audit: type=1400 audit(1734098307.941:1237): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.947225 kernel: audit: type=1400 audit(1734098307.941:1238): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.947249 kernel: audit: type=1400 audit(1734098307.941:1239): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.951868 kernel: audit: type=1400 audit(1734098307.941:1240): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.951961 kernel: audit: type=1400 audit(1734098307.941:1241): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.956861 kernel: audit: type=1400 audit(1734098307.941:1242): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.956911 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 13:58:27.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.957757 systemd-networkd[1055]: calif443f41f95a: Gained IPv6LL Dec 13 13:58:27.959465 kernel: audit: type=1400 audit(1734098307.941:1243): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.944000 audit: BPF prog-id=174 op=LOAD Dec 13 13:58:27.944000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.944000 audit[4012]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4003 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:27.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435653636396565343233613631346636356164336364373061393232 Dec 13 13:58:27.944000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.944000 audit[4012]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4003 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:27.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435653636396565343233613631346636356164336364373061393232 Dec 13 13:58:27.944000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.944000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.944000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.944000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.944000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.944000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.944000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.944000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.944000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.944000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.944000 audit: BPF prog-id=175 op=LOAD Dec 13 13:58:27.944000 audit[4012]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4003 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:27.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435653636396565343233613631346636356164336364373061393232 Dec 13 13:58:27.946000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.946000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.946000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.946000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.946000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.946000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.946000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.946000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.946000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.946000 audit: BPF prog-id=176 op=LOAD Dec 13 13:58:27.946000 audit[4012]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4003 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:27.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435653636396565343233613631346636356164336364373061393232 Dec 13 13:58:27.949000 audit: BPF prog-id=176 op=UNLOAD Dec 13 13:58:27.949000 audit: BPF prog-id=175 op=UNLOAD Dec 13 13:58:27.949000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.949000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.949000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.949000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.949000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.949000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.949000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.949000 audit[4012]: AVC avc: denied { perfmon } for pid=4012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.949000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.949000 audit[4012]: AVC avc: denied { bpf } for pid=4012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:27.949000 audit: BPF prog-id=177 op=LOAD Dec 13 13:58:27.949000 audit[4012]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4003 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:27.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435653636396565343233613631346636356164336364373061393232 Dec 13 13:58:27.977606 env[1222]: time="2024-12-13T13:58:27.977560011Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-79klx,Uid:27e8634a-86dc-4fd9-be3d-789a986b1796,Namespace:kube-system,Attempt:1,} returns sandbox id \"d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda\"" Dec 13 13:58:27.978299 kubelet[2074]: E1213 13:58:27.978279 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:27.980998 env[1222]: time="2024-12-13T13:58:27.980662473Z" level=info msg="CreateContainer within sandbox \"d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 13:58:27.995850 env[1222]: time="2024-12-13T13:58:27.995813512Z" level=info msg="CreateContainer within sandbox \"d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"1d7080e7afc08df0c06bc1d4728f0d4218914d9ccf4b3190689444b9ed91e862\"" Dec 13 13:58:27.996279 env[1222]: time="2024-12-13T13:58:27.996252035Z" level=info msg="StartContainer for \"1d7080e7afc08df0c06bc1d4728f0d4218914d9ccf4b3190689444b9ed91e862\"" Dec 13 13:58:28.012028 systemd[1]: Started cri-containerd-1d7080e7afc08df0c06bc1d4728f0d4218914d9ccf4b3190689444b9ed91e862.scope. Dec 13 13:58:28.018977 systemd[1]: run-netns-cni\x2d48b5b211\x2de0c9\x2ddff3\x2d4999\x2db9e849fe6328.mount: Deactivated successfully. Dec 13 13:58:28.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.031000 audit: BPF prog-id=178 op=LOAD Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit[4044]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=4003 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:28.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164373038306537616663303864663063303662633164343732386630 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit[4044]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=4003 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:28.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164373038306537616663303864663063303662633164343732386630 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit: BPF prog-id=179 op=LOAD Dec 13 13:58:28.034000 audit[4044]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=4003 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:28.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164373038306537616663303864663063303662633164343732386630 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.034000 audit: BPF prog-id=180 op=LOAD Dec 13 13:58:28.034000 audit[4044]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=4003 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:28.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164373038306537616663303864663063303662633164343732386630 Dec 13 13:58:28.036000 audit: BPF prog-id=180 op=UNLOAD Dec 13 13:58:28.036000 audit: BPF prog-id=179 op=UNLOAD Dec 13 13:58:28.036000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.036000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.036000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.036000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.036000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.036000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.036000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.036000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.036000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.036000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:28.036000 audit: BPF prog-id=181 op=LOAD Dec 13 13:58:28.036000 audit[4044]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=4003 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:28.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164373038306537616663303864663063303662633164343732386630 Dec 13 13:58:28.049915 env[1222]: time="2024-12-13T13:58:28.049865407Z" level=info msg="StartContainer for \"1d7080e7afc08df0c06bc1d4728f0d4218914d9ccf4b3190689444b9ed91e862\" returns successfully" Dec 13 13:58:28.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.25:22-10.0.0.1:46556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:28.286787 systemd[1]: Started sshd@12-10.0.0.25:22-10.0.0.1:46556.service. Dec 13 13:58:28.365000 audit[4076]: USER_ACCT pid=4076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:28.366474 sshd[4076]: Accepted publickey for core from 10.0.0.1 port 46556 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:28.366000 audit[4076]: CRED_ACQ pid=4076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:28.366000 audit[4076]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd1604110 a2=3 a3=1 items=0 ppid=1 pid=4076 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:28.366000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:28.368024 sshd[4076]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:28.372254 systemd[1]: Started session-13.scope. Dec 13 13:58:28.372690 systemd-logind[1210]: New session 13 of user core. Dec 13 13:58:28.375000 audit[4076]: USER_START pid=4076 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:28.376000 audit[4078]: CRED_ACQ pid=4078 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:28.542477 sshd[4076]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:28.543000 audit[4076]: USER_END pid=4076 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:28.543000 audit[4076]: CRED_DISP pid=4076 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:28.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.25:22-10.0.0.1:46556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:28.545041 systemd[1]: sshd@12-10.0.0.25:22-10.0.0.1:46556.service: Deactivated successfully. Dec 13 13:58:28.545778 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 13:58:28.546262 systemd-logind[1210]: Session 13 logged out. Waiting for processes to exit. Dec 13 13:58:28.546965 systemd-logind[1210]: Removed session 13. Dec 13 13:58:28.700737 env[1222]: time="2024-12-13T13:58:28.700691088Z" level=info msg="StopPodSandbox for \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\"" Dec 13 13:58:28.700913 env[1222]: time="2024-12-13T13:58:28.700705009Z" level=info msg="StopPodSandbox for \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\"" Dec 13 13:58:28.791224 env[1222]: 2024-12-13 13:58:28.747 [INFO][4123] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Dec 13 13:58:28.791224 env[1222]: 2024-12-13 13:58:28.747 [INFO][4123] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" iface="eth0" netns="/var/run/netns/cni-78d80088-2488-701b-3501-02d8c1271d1f" Dec 13 13:58:28.791224 env[1222]: 2024-12-13 13:58:28.747 [INFO][4123] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" iface="eth0" netns="/var/run/netns/cni-78d80088-2488-701b-3501-02d8c1271d1f" Dec 13 13:58:28.791224 env[1222]: 2024-12-13 13:58:28.747 [INFO][4123] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" iface="eth0" netns="/var/run/netns/cni-78d80088-2488-701b-3501-02d8c1271d1f" Dec 13 13:58:28.791224 env[1222]: 2024-12-13 13:58:28.747 [INFO][4123] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Dec 13 13:58:28.791224 env[1222]: 2024-12-13 13:58:28.747 [INFO][4123] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Dec 13 13:58:28.791224 env[1222]: 2024-12-13 13:58:28.775 [INFO][4136] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" HandleID="k8s-pod-network.0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Workload="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0" Dec 13 13:58:28.791224 env[1222]: 2024-12-13 13:58:28.775 [INFO][4136] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:28.791224 env[1222]: 2024-12-13 13:58:28.775 [INFO][4136] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:28.791224 env[1222]: 2024-12-13 13:58:28.784 [WARNING][4136] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" HandleID="k8s-pod-network.0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Workload="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0" Dec 13 13:58:28.791224 env[1222]: 2024-12-13 13:58:28.784 [INFO][4136] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" HandleID="k8s-pod-network.0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Workload="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0" Dec 13 13:58:28.791224 env[1222]: 2024-12-13 13:58:28.785 [INFO][4136] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:28.791224 env[1222]: 2024-12-13 13:58:28.789 [INFO][4123] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Dec 13 13:58:28.793858 systemd[1]: run-netns-cni\x2d78d80088\x2d2488\x2d701b\x2d3501\x2d02d8c1271d1f.mount: Deactivated successfully. Dec 13 13:58:28.794753 env[1222]: time="2024-12-13T13:58:28.794717994Z" level=info msg="TearDown network for sandbox \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\" successfully" Dec 13 13:58:28.794834 env[1222]: time="2024-12-13T13:58:28.794818203Z" level=info msg="StopPodSandbox for \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\" returns successfully" Dec 13 13:58:28.795661 env[1222]: time="2024-12-13T13:58:28.795625121Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75546fc5b6-rqjk9,Uid:e16f1cb8-65ba-4680-b325-d517863e2a42,Namespace:calico-apiserver,Attempt:1,}" Dec 13 13:58:28.811649 env[1222]: 2024-12-13 13:58:28.763 [INFO][4122] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Dec 13 13:58:28.811649 env[1222]: 2024-12-13 13:58:28.764 [INFO][4122] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" iface="eth0" netns="/var/run/netns/cni-72f4b9b3-64ba-86b4-a60a-47910c6d7d1a" Dec 13 13:58:28.811649 env[1222]: 2024-12-13 13:58:28.764 [INFO][4122] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" iface="eth0" netns="/var/run/netns/cni-72f4b9b3-64ba-86b4-a60a-47910c6d7d1a" Dec 13 13:58:28.811649 env[1222]: 2024-12-13 13:58:28.764 [INFO][4122] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" iface="eth0" netns="/var/run/netns/cni-72f4b9b3-64ba-86b4-a60a-47910c6d7d1a" Dec 13 13:58:28.811649 env[1222]: 2024-12-13 13:58:28.764 [INFO][4122] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Dec 13 13:58:28.811649 env[1222]: 2024-12-13 13:58:28.764 [INFO][4122] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Dec 13 13:58:28.811649 env[1222]: 2024-12-13 13:58:28.797 [INFO][4143] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" HandleID="k8s-pod-network.ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Workload="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0" Dec 13 13:58:28.811649 env[1222]: 2024-12-13 13:58:28.798 [INFO][4143] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:28.811649 env[1222]: 2024-12-13 13:58:28.798 [INFO][4143] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:28.811649 env[1222]: 2024-12-13 13:58:28.806 [WARNING][4143] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" HandleID="k8s-pod-network.ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Workload="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0" Dec 13 13:58:28.811649 env[1222]: 2024-12-13 13:58:28.806 [INFO][4143] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" HandleID="k8s-pod-network.ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Workload="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0" Dec 13 13:58:28.811649 env[1222]: 2024-12-13 13:58:28.807 [INFO][4143] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:28.811649 env[1222]: 2024-12-13 13:58:28.809 [INFO][4122] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Dec 13 13:58:28.815027 env[1222]: time="2024-12-13T13:58:28.811793586Z" level=info msg="TearDown network for sandbox \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\" successfully" Dec 13 13:58:28.815027 env[1222]: time="2024-12-13T13:58:28.811822269Z" level=info msg="StopPodSandbox for \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\" returns successfully" Dec 13 13:58:28.813773 systemd[1]: run-netns-cni\x2d72f4b9b3\x2d64ba\x2d86b4\x2da60a\x2d47910c6d7d1a.mount: Deactivated successfully. Dec 13 13:58:28.815383 env[1222]: time="2024-12-13T13:58:28.815357446Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75546fc5b6-6f6gc,Uid:abfada76-ba20-42c7-9bea-d459bdb5d231,Namespace:calico-apiserver,Attempt:1,}" Dec 13 13:58:28.866834 kubelet[2074]: E1213 13:58:28.861757 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:28.867790 kubelet[2074]: E1213 13:58:28.867362 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:28.878860 kubelet[2074]: I1213 13:58:28.878812 2074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-79klx" podStartSLOduration=32.878776146999996 podStartE2EDuration="32.878776147s" podCreationTimestamp="2024-12-13 13:57:56 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 13:58:28.878244897 +0000 UTC m=+46.324202116" watchObservedRunningTime="2024-12-13 13:58:28.878776147 +0000 UTC m=+46.324733366" Dec 13 13:58:28.885000 audit[4185]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4185 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:28.885000 audit[4185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd631cf30 a2=0 a3=1 items=0 ppid=2234 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:28.885000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:28.891000 audit[4185]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=4185 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:28.891000 audit[4185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffd631cf30 a2=0 a3=1 items=0 ppid=2234 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:28.891000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:28.908000 audit[4196]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4196 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:28.908000 audit[4196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd3b5ec40 a2=0 a3=1 items=0 ppid=2234 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:28.908000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:28.921000 audit[4196]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=4196 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:28.921000 audit[4196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffd3b5ec40 a2=0 a3=1 items=0 ppid=2234 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:28.921000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:28.981779 systemd-networkd[1055]: cali16773194782: Gained IPv6LL Dec 13 13:58:28.983110 systemd-networkd[1055]: cali02d9551259c: Link UP Dec 13 13:58:28.984928 systemd-networkd[1055]: cali02d9551259c: Gained carrier Dec 13 13:58:28.985478 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 13:58:28.985528 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali02d9551259c: link becomes ready Dec 13 13:58:29.008869 env[1222]: 2024-12-13 13:58:28.873 [INFO][4162] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0 calico-apiserver-75546fc5b6- calico-apiserver abfada76-ba20-42c7-9bea-d459bdb5d231 974 0 2024-12-13 13:58:04 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75546fc5b6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-75546fc5b6-6f6gc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali02d9551259c [] []}} ContainerID="7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52" Namespace="calico-apiserver" Pod="calico-apiserver-75546fc5b6-6f6gc" WorkloadEndpoint="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-" Dec 13 13:58:29.008869 env[1222]: 2024-12-13 13:58:28.874 [INFO][4162] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52" Namespace="calico-apiserver" Pod="calico-apiserver-75546fc5b6-6f6gc" WorkloadEndpoint="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0" Dec 13 13:58:29.008869 env[1222]: 2024-12-13 13:58:28.933 [INFO][4190] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52" HandleID="k8s-pod-network.7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52" Workload="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0" Dec 13 13:58:29.008869 env[1222]: 2024-12-13 13:58:28.946 [INFO][4190] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52" HandleID="k8s-pod-network.7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52" Workload="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000332c80), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-75546fc5b6-6f6gc", "timestamp":"2024-12-13 13:58:28.933272116 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 13:58:29.008869 env[1222]: 2024-12-13 13:58:28.946 [INFO][4190] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:29.008869 env[1222]: 2024-12-13 13:58:28.946 [INFO][4190] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:29.008869 env[1222]: 2024-12-13 13:58:28.946 [INFO][4190] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 13:58:29.008869 env[1222]: 2024-12-13 13:58:28.953 [INFO][4190] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52" host="localhost" Dec 13 13:58:29.008869 env[1222]: 2024-12-13 13:58:28.957 [INFO][4190] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 13:58:29.008869 env[1222]: 2024-12-13 13:58:28.961 [INFO][4190] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 13:58:29.008869 env[1222]: 2024-12-13 13:58:28.963 [INFO][4190] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 13:58:29.008869 env[1222]: 2024-12-13 13:58:28.965 [INFO][4190] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 13:58:29.008869 env[1222]: 2024-12-13 13:58:28.965 [INFO][4190] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52" host="localhost" Dec 13 13:58:29.008869 env[1222]: 2024-12-13 13:58:28.967 [INFO][4190] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52 Dec 13 13:58:29.008869 env[1222]: 2024-12-13 13:58:28.971 [INFO][4190] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52" host="localhost" Dec 13 13:58:29.008869 env[1222]: 2024-12-13 13:58:28.977 [INFO][4190] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52" host="localhost" Dec 13 13:58:29.008869 env[1222]: 2024-12-13 13:58:28.977 [INFO][4190] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52" host="localhost" Dec 13 13:58:29.008869 env[1222]: 2024-12-13 13:58:28.977 [INFO][4190] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:29.008869 env[1222]: 2024-12-13 13:58:28.977 [INFO][4190] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52" HandleID="k8s-pod-network.7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52" Workload="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0" Dec 13 13:58:29.009689 env[1222]: 2024-12-13 13:58:28.979 [INFO][4162] cni-plugin/k8s.go 386: Populated endpoint ContainerID="7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52" Namespace="calico-apiserver" Pod="calico-apiserver-75546fc5b6-6f6gc" WorkloadEndpoint="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0", GenerateName:"calico-apiserver-75546fc5b6-", Namespace:"calico-apiserver", SelfLink:"", UID:"abfada76-ba20-42c7-9bea-d459bdb5d231", ResourceVersion:"974", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75546fc5b6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-75546fc5b6-6f6gc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali02d9551259c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:29.009689 env[1222]: 2024-12-13 13:58:28.979 [INFO][4162] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52" Namespace="calico-apiserver" Pod="calico-apiserver-75546fc5b6-6f6gc" WorkloadEndpoint="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0" Dec 13 13:58:29.009689 env[1222]: 2024-12-13 13:58:28.979 [INFO][4162] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali02d9551259c ContainerID="7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52" Namespace="calico-apiserver" Pod="calico-apiserver-75546fc5b6-6f6gc" WorkloadEndpoint="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0" Dec 13 13:58:29.009689 env[1222]: 2024-12-13 13:58:28.985 [INFO][4162] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52" Namespace="calico-apiserver" Pod="calico-apiserver-75546fc5b6-6f6gc" WorkloadEndpoint="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0" Dec 13 13:58:29.009689 env[1222]: 2024-12-13 13:58:28.985 [INFO][4162] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52" Namespace="calico-apiserver" Pod="calico-apiserver-75546fc5b6-6f6gc" WorkloadEndpoint="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0", GenerateName:"calico-apiserver-75546fc5b6-", Namespace:"calico-apiserver", SelfLink:"", UID:"abfada76-ba20-42c7-9bea-d459bdb5d231", ResourceVersion:"974", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75546fc5b6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52", Pod:"calico-apiserver-75546fc5b6-6f6gc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali02d9551259c", MAC:"2e:1e:d7:f1:85:3d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:29.009689 env[1222]: 2024-12-13 13:58:29.005 [INFO][4162] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52" Namespace="calico-apiserver" Pod="calico-apiserver-75546fc5b6-6f6gc" WorkloadEndpoint="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0" Dec 13 13:58:29.014000 audit[4218]: NETFILTER_CFG table=filter:113 family=2 entries=56 op=nft_register_chain pid=4218 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:58:29.014000 audit[4218]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=28244 a0=3 a1=ffffee375a80 a2=0 a3=ffff93297fa8 items=0 ppid=3232 pid=4218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:29.014000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:58:29.035374 env[1222]: time="2024-12-13T13:58:29.035326285Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:29.037779 env[1222]: time="2024-12-13T13:58:29.037739231Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:32c335fdb9d757e7ba6a76a9cfa8d292a5a229101ae7ea37b42f53c28adf2db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:29.040117 env[1222]: time="2024-12-13T13:58:29.040053607Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:29.040850 env[1222]: time="2024-12-13T13:58:29.040522811Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:58:29.040850 env[1222]: time="2024-12-13T13:58:29.040566655Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:58:29.040850 env[1222]: time="2024-12-13T13:58:29.040576656Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:58:29.040850 env[1222]: time="2024-12-13T13:58:29.040745312Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52 pid=4226 runtime=io.containerd.runc.v2 Dec 13 13:58:29.042915 env[1222]: time="2024-12-13T13:58:29.042882552Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:29.043344 env[1222]: time="2024-12-13T13:58:29.043317713Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:32c335fdb9d757e7ba6a76a9cfa8d292a5a229101ae7ea37b42f53c28adf2db1\"" Dec 13 13:58:29.047377 env[1222]: time="2024-12-13T13:58:29.046916250Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 13:58:29.058948 env[1222]: time="2024-12-13T13:58:29.058902053Z" level=info msg="CreateContainer within sandbox \"8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 13:58:29.061389 systemd[1]: run-containerd-runc-k8s.io-7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52-runc.KWhfwI.mount: Deactivated successfully. Dec 13 13:58:29.064881 systemd[1]: Started cri-containerd-7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52.scope. Dec 13 13:58:29.074435 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1817aaeafef: link becomes ready Dec 13 13:58:29.071708 systemd-networkd[1055]: cali1817aaeafef: Link UP Dec 13 13:58:29.072049 systemd-networkd[1055]: cali1817aaeafef: Gained carrier Dec 13 13:58:29.087120 env[1222]: time="2024-12-13T13:58:29.087059450Z" level=info msg="CreateContainer within sandbox \"8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"bcc4892ccd4a792f0f811b613dad10e34c532ec0a83a3a90724ec79dcf4aea1b\"" Dec 13 13:58:29.087258 env[1222]: 2024-12-13 13:58:28.869 [INFO][4152] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0 calico-apiserver-75546fc5b6- calico-apiserver e16f1cb8-65ba-4680-b325-d517863e2a42 973 0 2024-12-13 13:58:04 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:75546fc5b6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-75546fc5b6-rqjk9 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali1817aaeafef [] []}} ContainerID="2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e" Namespace="calico-apiserver" Pod="calico-apiserver-75546fc5b6-rqjk9" WorkloadEndpoint="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-" Dec 13 13:58:29.087258 env[1222]: 2024-12-13 13:58:28.869 [INFO][4152] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e" Namespace="calico-apiserver" Pod="calico-apiserver-75546fc5b6-rqjk9" WorkloadEndpoint="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0" Dec 13 13:58:29.087258 env[1222]: 2024-12-13 13:58:28.934 [INFO][4183] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e" HandleID="k8s-pod-network.2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e" Workload="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0" Dec 13 13:58:29.087258 env[1222]: 2024-12-13 13:58:28.952 [INFO][4183] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e" HandleID="k8s-pod-network.2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e" Workload="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000332ca0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-75546fc5b6-rqjk9", "timestamp":"2024-12-13 13:58:28.934520715 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 13:58:29.087258 env[1222]: 2024-12-13 13:58:28.952 [INFO][4183] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:29.087258 env[1222]: 2024-12-13 13:58:28.977 [INFO][4183] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:29.087258 env[1222]: 2024-12-13 13:58:28.977 [INFO][4183] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 13:58:29.087258 env[1222]: 2024-12-13 13:58:28.979 [INFO][4183] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e" host="localhost" Dec 13 13:58:29.087258 env[1222]: 2024-12-13 13:58:28.986 [INFO][4183] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 13:58:29.087258 env[1222]: 2024-12-13 13:58:29.031 [INFO][4183] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 13:58:29.087258 env[1222]: 2024-12-13 13:58:29.033 [INFO][4183] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 13:58:29.087258 env[1222]: 2024-12-13 13:58:29.036 [INFO][4183] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 13:58:29.087258 env[1222]: 2024-12-13 13:58:29.036 [INFO][4183] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e" host="localhost" Dec 13 13:58:29.087258 env[1222]: 2024-12-13 13:58:29.037 [INFO][4183] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e Dec 13 13:58:29.087258 env[1222]: 2024-12-13 13:58:29.042 [INFO][4183] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e" host="localhost" Dec 13 13:58:29.087258 env[1222]: 2024-12-13 13:58:29.050 [INFO][4183] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e" host="localhost" Dec 13 13:58:29.087258 env[1222]: 2024-12-13 13:58:29.050 [INFO][4183] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e" host="localhost" Dec 13 13:58:29.087258 env[1222]: 2024-12-13 13:58:29.050 [INFO][4183] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:29.087258 env[1222]: 2024-12-13 13:58:29.050 [INFO][4183] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e" HandleID="k8s-pod-network.2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e" Workload="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0" Dec 13 13:58:29.088380 env[1222]: 2024-12-13 13:58:29.062 [INFO][4152] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e" Namespace="calico-apiserver" Pod="calico-apiserver-75546fc5b6-rqjk9" WorkloadEndpoint="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0", GenerateName:"calico-apiserver-75546fc5b6-", Namespace:"calico-apiserver", SelfLink:"", UID:"e16f1cb8-65ba-4680-b325-d517863e2a42", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75546fc5b6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-75546fc5b6-rqjk9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1817aaeafef", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:29.088380 env[1222]: 2024-12-13 13:58:29.062 [INFO][4152] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e" Namespace="calico-apiserver" Pod="calico-apiserver-75546fc5b6-rqjk9" WorkloadEndpoint="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0" Dec 13 13:58:29.088380 env[1222]: 2024-12-13 13:58:29.062 [INFO][4152] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1817aaeafef ContainerID="2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e" Namespace="calico-apiserver" Pod="calico-apiserver-75546fc5b6-rqjk9" WorkloadEndpoint="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0" Dec 13 13:58:29.088380 env[1222]: 2024-12-13 13:58:29.068 [INFO][4152] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e" Namespace="calico-apiserver" Pod="calico-apiserver-75546fc5b6-rqjk9" WorkloadEndpoint="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0" Dec 13 13:58:29.088380 env[1222]: 2024-12-13 13:58:29.068 [INFO][4152] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e" Namespace="calico-apiserver" Pod="calico-apiserver-75546fc5b6-rqjk9" WorkloadEndpoint="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0", GenerateName:"calico-apiserver-75546fc5b6-", Namespace:"calico-apiserver", SelfLink:"", UID:"e16f1cb8-65ba-4680-b325-d517863e2a42", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75546fc5b6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e", Pod:"calico-apiserver-75546fc5b6-rqjk9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1817aaeafef", MAC:"3a:f1:5b:51:dd:a1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:29.088380 env[1222]: 2024-12-13 13:58:29.079 [INFO][4152] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e" Namespace="calico-apiserver" Pod="calico-apiserver-75546fc5b6-rqjk9" WorkloadEndpoint="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0" Dec 13 13:58:29.090198 env[1222]: time="2024-12-13T13:58:29.090159741Z" level=info msg="StartContainer for \"bcc4892ccd4a792f0f811b613dad10e34c532ec0a83a3a90724ec79dcf4aea1b\"" Dec 13 13:58:29.094000 audit[4269]: NETFILTER_CFG table=filter:114 family=2 entries=56 op=nft_register_chain pid=4269 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:58:29.094000 audit[4269]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=27932 a0=3 a1=ffffe6074930 a2=0 a3=ffff89b0ffa8 items=0 ppid=3232 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:29.094000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:58:29.111473 systemd[1]: Started cri-containerd-bcc4892ccd4a792f0f811b613dad10e34c532ec0a83a3a90724ec79dcf4aea1b.scope. Dec 13 13:58:29.118278 env[1222]: time="2024-12-13T13:58:29.118209448Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:58:29.118278 env[1222]: time="2024-12-13T13:58:29.118256813Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:58:29.118278 env[1222]: time="2024-12-13T13:58:29.118267534Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:58:29.118482 env[1222]: time="2024-12-13T13:58:29.118430989Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e pid=4296 runtime=io.containerd.runc.v2 Dec 13 13:58:29.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.142000 audit: BPF prog-id=182 op=LOAD Dec 13 13:58:29.145894 systemd[1]: Started cri-containerd-2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e.scope. Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { bpf } for pid=4236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4226 pid=4236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:29.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764626465613133363763333765643063356663303233656538613563 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { perfmon } for pid=4236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4226 pid=4236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:29.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764626465613133363763333765643063356663303233656538613563 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { bpf } for pid=4236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { bpf } for pid=4236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { bpf } for pid=4236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { perfmon } for pid=4236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { perfmon } for pid=4236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { perfmon } for pid=4236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { perfmon } for pid=4236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { perfmon } for pid=4236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { bpf } for pid=4236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { bpf } for pid=4236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit: BPF prog-id=183 op=LOAD Dec 13 13:58:29.145000 audit[4236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4226 pid=4236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:29.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764626465613133363763333765643063356663303233656538613563 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { bpf } for pid=4236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { bpf } for pid=4236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { perfmon } for pid=4236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { perfmon } for pid=4236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { perfmon } for pid=4236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { perfmon } for pid=4236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { perfmon } for pid=4236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { bpf } for pid=4236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { bpf } for pid=4236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit: BPF prog-id=184 op=LOAD Dec 13 13:58:29.145000 audit[4236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4226 pid=4236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:29.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764626465613133363763333765643063356663303233656538613563 Dec 13 13:58:29.145000 audit: BPF prog-id=184 op=UNLOAD Dec 13 13:58:29.145000 audit: BPF prog-id=183 op=UNLOAD Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { bpf } for pid=4236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { bpf } for pid=4236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { bpf } for pid=4236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { perfmon } for pid=4236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { perfmon } for pid=4236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { perfmon } for pid=4236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { perfmon } for pid=4236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { perfmon } for pid=4236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { bpf } for pid=4236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit[4236]: AVC avc: denied { bpf } for pid=4236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.145000 audit: BPF prog-id=185 op=LOAD Dec 13 13:58:29.145000 audit[4236]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4226 pid=4236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:29.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764626465613133363763333765643063356663303233656538613563 Dec 13 13:58:29.147781 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 13:58:29.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.156000 audit: BPF prog-id=186 op=LOAD Dec 13 13:58:29.157000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.157000 audit[4279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3811 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:29.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263633438393263636434613739326630663831316236313364616431 Dec 13 13:58:29.157000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.157000 audit[4279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3811 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:29.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263633438393263636434613739326630663831316236313364616431 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit: BPF prog-id=187 op=LOAD Dec 13 13:58:29.158000 audit[4279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3811 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:29.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263633438393263636434613739326630663831316236313364616431 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit: BPF prog-id=188 op=LOAD Dec 13 13:58:29.158000 audit[4279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3811 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:29.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263633438393263636434613739326630663831316236313364616431 Dec 13 13:58:29.158000 audit: BPF prog-id=188 op=UNLOAD Dec 13 13:58:29.158000 audit: BPF prog-id=187 op=UNLOAD Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.158000 audit: BPF prog-id=189 op=LOAD Dec 13 13:58:29.158000 audit[4279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3811 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:29.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263633438393263636434613739326630663831316236313364616431 Dec 13 13:58:29.173195 env[1222]: time="2024-12-13T13:58:29.173148874Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75546fc5b6-6f6gc,Uid:abfada76-ba20-42c7-9bea-d459bdb5d231,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52\"" Dec 13 13:58:29.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.173000 audit: BPF prog-id=190 op=LOAD Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4296 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:29.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313131666361363262386162366138636334363866323838333261 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4296 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:29.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313131666361363262386162366138636334363866323838333261 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit: BPF prog-id=191 op=LOAD Dec 13 13:58:29.174000 audit[4306]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4296 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:29.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313131666361363262386162366138636334363866323838333261 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit: BPF prog-id=192 op=LOAD Dec 13 13:58:29.174000 audit[4306]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4296 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:29.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313131666361363262386162366138636334363866323838333261 Dec 13 13:58:29.174000 audit: BPF prog-id=192 op=UNLOAD Dec 13 13:58:29.174000 audit: BPF prog-id=191 op=UNLOAD Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { perfmon } for pid=4306 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit[4306]: AVC avc: denied { bpf } for pid=4306 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:29.174000 audit: BPF prog-id=193 op=LOAD Dec 13 13:58:29.174000 audit[4306]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4296 pid=4306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:29.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313131666361363262386162366138636334363866323838333261 Dec 13 13:58:29.180599 systemd-resolved[1160]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 13:58:29.190000 env[1222]: time="2024-12-13T13:58:29.189956129Z" level=info msg="StartContainer for \"bcc4892ccd4a792f0f811b613dad10e34c532ec0a83a3a90724ec79dcf4aea1b\" returns successfully" Dec 13 13:58:29.204418 env[1222]: time="2024-12-13T13:58:29.204316954Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-75546fc5b6-rqjk9,Uid:e16f1cb8-65ba-4680-b325-d517863e2a42,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e\"" Dec 13 13:58:29.685583 systemd-networkd[1055]: calid784a9021da: Gained IPv6LL Dec 13 13:58:29.873467 kubelet[2074]: E1213 13:58:29.873419 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:29.881226 kubelet[2074]: I1213 13:58:29.881185 2074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6bcd7c76ff-25fc7" podStartSLOduration=23.868036714 podStartE2EDuration="25.881142231s" podCreationTimestamp="2024-12-13 13:58:04 +0000 UTC" firstStartedPulling="2024-12-13 13:58:27.032216504 +0000 UTC m=+44.478173723" lastFinishedPulling="2024-12-13 13:58:29.045322061 +0000 UTC m=+46.491279240" observedRunningTime="2024-12-13 13:58:29.880826841 +0000 UTC m=+47.326784060" watchObservedRunningTime="2024-12-13 13:58:29.881142231 +0000 UTC m=+47.327099450" Dec 13 13:58:30.001919 env[1222]: time="2024-12-13T13:58:30.001810053Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:30.004088 env[1222]: time="2024-12-13T13:58:30.004057139Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:30.005783 env[1222]: time="2024-12-13T13:58:30.005759056Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:30.006928 env[1222]: time="2024-12-13T13:58:30.006898360Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:30.008020 env[1222]: time="2024-12-13T13:58:30.007988061Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349\"" Dec 13 13:58:30.009489 env[1222]: time="2024-12-13T13:58:30.009033997Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 13:58:30.010513 env[1222]: time="2024-12-13T13:58:30.010483290Z" level=info msg="CreateContainer within sandbox \"b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 13:58:30.026552 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1239425985.mount: Deactivated successfully. Dec 13 13:58:30.029831 env[1222]: time="2024-12-13T13:58:30.029791824Z" level=info msg="CreateContainer within sandbox \"b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"898128766b37035f3ee266769d7cb41a98df92478207b78742c1b653d2031559\"" Dec 13 13:58:30.031420 env[1222]: time="2024-12-13T13:58:30.031393771Z" level=info msg="StartContainer for \"898128766b37035f3ee266769d7cb41a98df92478207b78742c1b653d2031559\"" Dec 13 13:58:30.051777 systemd[1]: Started cri-containerd-898128766b37035f3ee266769d7cb41a98df92478207b78742c1b653d2031559.scope. Dec 13 13:58:30.069000 audit[4392]: AVC avc: denied { perfmon } for pid=4392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.069000 audit[4392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3641 pid=4392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:30.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839383132383736366233373033356633656532363637363964376362 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { bpf } for pid=4392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { bpf } for pid=4392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { bpf } for pid=4392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { perfmon } for pid=4392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { perfmon } for pid=4392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { perfmon } for pid=4392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { perfmon } for pid=4392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { perfmon } for pid=4392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { bpf } for pid=4392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { bpf } for pid=4392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit: BPF prog-id=194 op=LOAD Dec 13 13:58:30.070000 audit[4392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3641 pid=4392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:30.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839383132383736366233373033356633656532363637363964376362 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { bpf } for pid=4392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { bpf } for pid=4392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { perfmon } for pid=4392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { perfmon } for pid=4392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { perfmon } for pid=4392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { perfmon } for pid=4392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { perfmon } for pid=4392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { bpf } for pid=4392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { bpf } for pid=4392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit: BPF prog-id=195 op=LOAD Dec 13 13:58:30.070000 audit[4392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3641 pid=4392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:30.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839383132383736366233373033356633656532363637363964376362 Dec 13 13:58:30.070000 audit: BPF prog-id=195 op=UNLOAD Dec 13 13:58:30.070000 audit: BPF prog-id=194 op=UNLOAD Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { bpf } for pid=4392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { bpf } for pid=4392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { bpf } for pid=4392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { perfmon } for pid=4392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { perfmon } for pid=4392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { perfmon } for pid=4392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { perfmon } for pid=4392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { perfmon } for pid=4392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { bpf } for pid=4392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit[4392]: AVC avc: denied { bpf } for pid=4392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:30.070000 audit: BPF prog-id=196 op=LOAD Dec 13 13:58:30.070000 audit[4392]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3641 pid=4392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:30.070000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839383132383736366233373033356633656532363637363964376362 Dec 13 13:58:30.083619 env[1222]: time="2024-12-13T13:58:30.083574646Z" level=info msg="StartContainer for \"898128766b37035f3ee266769d7cb41a98df92478207b78742c1b653d2031559\" returns successfully" Dec 13 13:58:30.389620 systemd-networkd[1055]: cali02d9551259c: Gained IPv6LL Dec 13 13:58:30.769410 kubelet[2074]: I1213 13:58:30.769251 2074 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 13:58:30.769410 kubelet[2074]: I1213 13:58:30.769340 2074 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 13:58:30.837623 systemd-networkd[1055]: cali1817aaeafef: Gained IPv6LL Dec 13 13:58:30.889629 kubelet[2074]: E1213 13:58:30.889571 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:30.900818 kubelet[2074]: I1213 13:58:30.900783 2074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-674z4" podStartSLOduration=23.183211883 podStartE2EDuration="26.900747051s" podCreationTimestamp="2024-12-13 13:58:04 +0000 UTC" firstStartedPulling="2024-12-13 13:58:26.290771122 +0000 UTC m=+43.736728341" lastFinishedPulling="2024-12-13 13:58:30.00830629 +0000 UTC m=+47.454263509" observedRunningTime="2024-12-13 13:58:30.900330653 +0000 UTC m=+48.346287872" watchObservedRunningTime="2024-12-13 13:58:30.900747051 +0000 UTC m=+48.346704270" Dec 13 13:58:31.598679 env[1222]: time="2024-12-13T13:58:31.598613015Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:31.601092 env[1222]: time="2024-12-13T13:58:31.601058676Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:31.603529 env[1222]: time="2024-12-13T13:58:31.603502497Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:31.605717 env[1222]: time="2024-12-13T13:58:31.605691454Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:31.606425 env[1222]: time="2024-12-13T13:58:31.606391037Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c\"" Dec 13 13:58:31.608006 env[1222]: time="2024-12-13T13:58:31.607979660Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 13:58:31.609818 env[1222]: time="2024-12-13T13:58:31.609781263Z" level=info msg="CreateContainer within sandbox \"7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 13:58:31.622944 env[1222]: time="2024-12-13T13:58:31.622892166Z" level=info msg="CreateContainer within sandbox \"7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"69ef89ad553befd26678444bb0184b7616248f23a17dfa4c2dfcde31f30bbc7b\"" Dec 13 13:58:31.624421 env[1222]: time="2024-12-13T13:58:31.624377580Z" level=info msg="StartContainer for \"69ef89ad553befd26678444bb0184b7616248f23a17dfa4c2dfcde31f30bbc7b\"" Dec 13 13:58:31.642774 systemd[1]: Started cri-containerd-69ef89ad553befd26678444bb0184b7616248f23a17dfa4c2dfcde31f30bbc7b.scope. Dec 13 13:58:31.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.661000 audit: BPF prog-id=197 op=LOAD Dec 13 13:58:31.662000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.662000 audit[4430]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4226 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:31.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656638396164353533626566643236363738343434626230313834 Dec 13 13:58:31.663000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.663000 audit[4430]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4226 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:31.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656638396164353533626566643236363738343434626230313834 Dec 13 13:58:31.663000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.663000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.663000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.663000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.663000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.663000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.663000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.663000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.663000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.663000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.663000 audit: BPF prog-id=198 op=LOAD Dec 13 13:58:31.663000 audit[4430]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4226 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:31.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656638396164353533626566643236363738343434626230313834 Dec 13 13:58:31.664000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.664000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.664000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.664000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.664000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.664000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.664000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.664000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.664000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.664000 audit: BPF prog-id=199 op=LOAD Dec 13 13:58:31.664000 audit[4430]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4226 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:31.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656638396164353533626566643236363738343434626230313834 Dec 13 13:58:31.664000 audit: BPF prog-id=199 op=UNLOAD Dec 13 13:58:31.664000 audit: BPF prog-id=198 op=UNLOAD Dec 13 13:58:31.664000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.664000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.664000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.664000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.664000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.664000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.664000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.664000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.664000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.664000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.664000 audit: BPF prog-id=200 op=LOAD Dec 13 13:58:31.664000 audit[4430]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4226 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:31.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656638396164353533626566643236363738343434626230313834 Dec 13 13:58:31.699383 env[1222]: time="2024-12-13T13:58:31.699332862Z" level=info msg="StartContainer for \"69ef89ad553befd26678444bb0184b7616248f23a17dfa4c2dfcde31f30bbc7b\" returns successfully" Dec 13 13:58:31.878780 env[1222]: time="2024-12-13T13:58:31.878655399Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:31.881031 env[1222]: time="2024-12-13T13:58:31.880993730Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:31.882299 env[1222]: time="2024-12-13T13:58:31.882267605Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:31.883687 env[1222]: time="2024-12-13T13:58:31.883652369Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:31.884071 env[1222]: time="2024-12-13T13:58:31.884033684Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c\"" Dec 13 13:58:31.886259 env[1222]: time="2024-12-13T13:58:31.886222801Z" level=info msg="CreateContainer within sandbox \"2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 13:58:31.896069 env[1222]: time="2024-12-13T13:58:31.896031286Z" level=info msg="CreateContainer within sandbox \"2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"97484b1cefe7fffd7f54b7a0591ab12661b09d6cdc9e7f8b9e7c74d159c0ef48\"" Dec 13 13:58:31.898673 env[1222]: time="2024-12-13T13:58:31.898639441Z" level=info msg="StartContainer for \"97484b1cefe7fffd7f54b7a0591ab12661b09d6cdc9e7f8b9e7c74d159c0ef48\"" Dec 13 13:58:31.903561 kubelet[2074]: I1213 13:58:31.903438 2074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-75546fc5b6-6f6gc" podStartSLOduration=25.470535026 podStartE2EDuration="27.903403671s" podCreationTimestamp="2024-12-13 13:58:04 +0000 UTC" firstStartedPulling="2024-12-13 13:58:29.174417833 +0000 UTC m=+46.620375052" lastFinishedPulling="2024-12-13 13:58:31.607286438 +0000 UTC m=+49.053243697" observedRunningTime="2024-12-13 13:58:31.9026138 +0000 UTC m=+49.348571019" watchObservedRunningTime="2024-12-13 13:58:31.903403671 +0000 UTC m=+49.349360890" Dec 13 13:58:31.919000 audit[4475]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4475 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:31.919000 audit[4475]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe8e6d1f0 a2=0 a3=1 items=0 ppid=2234 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:31.919000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:31.926203 systemd[1]: Started cri-containerd-97484b1cefe7fffd7f54b7a0591ab12661b09d6cdc9e7f8b9e7c74d159c0ef48.scope. Dec 13 13:58:31.927000 audit[4475]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4475 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:31.927000 audit[4475]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe8e6d1f0 a2=0 a3=1 items=0 ppid=2234 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:31.927000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:31.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit: BPF prog-id=201 op=LOAD Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4296 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:31.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343834623163656665376666666437663534623761303539316162 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4296 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:31.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343834623163656665376666666437663534623761303539316162 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit: BPF prog-id=202 op=LOAD Dec 13 13:58:31.957000 audit[4468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4296 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:31.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343834623163656665376666666437663534623761303539316162 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit: BPF prog-id=203 op=LOAD Dec 13 13:58:31.957000 audit[4468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4296 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:31.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343834623163656665376666666437663534623761303539316162 Dec 13 13:58:31.957000 audit: BPF prog-id=203 op=UNLOAD Dec 13 13:58:31.957000 audit: BPF prog-id=202 op=UNLOAD Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:31.957000 audit: BPF prog-id=204 op=LOAD Dec 13 13:58:31.957000 audit[4468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4296 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:31.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937343834623163656665376666666437663534623761303539316162 Dec 13 13:58:31.975463 env[1222]: time="2024-12-13T13:58:31.975407927Z" level=info msg="StartContainer for \"97484b1cefe7fffd7f54b7a0591ab12661b09d6cdc9e7f8b9e7c74d159c0ef48\" returns successfully" Dec 13 13:58:32.606000 audit[4441]: AVC avc: denied { watch } for pid=4441 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_13_58_12.2858692644/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c1001 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c12,c1001 tclass=file permissive=0 Dec 13 13:58:32.606000 audit[4441]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4001404860 a2=fc6 a3=0 items=0 ppid=4226 pid=4441 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c1001 key=(null) Dec 13 13:58:32.606000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 13:58:32.650000 audit[4503]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:32.650000 audit[4503]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff6159110 a2=0 a3=1 items=0 ppid=2234 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:32.650000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:32.658000 audit[4503]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4503 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:32.658000 audit[4503]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=fffff6159110 a2=0 a3=1 items=0 ppid=2234 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:32.658000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:32.904292 kubelet[2074]: I1213 13:58:32.904182 2074 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-75546fc5b6-rqjk9" podStartSLOduration=26.224848966 podStartE2EDuration="28.904140894s" podCreationTimestamp="2024-12-13 13:58:04 +0000 UTC" firstStartedPulling="2024-12-13 13:58:29.205466221 +0000 UTC m=+46.651423400" lastFinishedPulling="2024-12-13 13:58:31.884758109 +0000 UTC m=+49.330715328" observedRunningTime="2024-12-13 13:58:32.903762741 +0000 UTC m=+50.349719960" watchObservedRunningTime="2024-12-13 13:58:32.904140894 +0000 UTC m=+50.350098113" Dec 13 13:58:32.925547 kernel: kauditd_printk_skb: 479 callbacks suppressed Dec 13 13:58:32.925684 kernel: audit: type=1325 audit(1734098312.918:1389): table=filter:119 family=2 entries=8 op=nft_register_rule pid=4505 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:32.925719 kernel: audit: type=1300 audit(1734098312.918:1389): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc8a0b400 a2=0 a3=1 items=0 ppid=2234 pid=4505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:32.918000 audit[4505]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4505 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:32.918000 audit[4505]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc8a0b400 a2=0 a3=1 items=0 ppid=2234 pid=4505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:32.918000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:32.929154 kernel: audit: type=1327 audit(1734098312.918:1389): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:32.930000 audit[4505]: NETFILTER_CFG table=nat:120 family=2 entries=30 op=nft_register_rule pid=4505 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:32.930000 audit[4505]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffc8a0b400 a2=0 a3=1 items=0 ppid=2234 pid=4505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:32.937701 kernel: audit: type=1325 audit(1734098312.930:1390): table=nat:120 family=2 entries=30 op=nft_register_rule pid=4505 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:32.937769 kernel: audit: type=1300 audit(1734098312.930:1390): arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffc8a0b400 a2=0 a3=1 items=0 ppid=2234 pid=4505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:32.937789 kernel: audit: type=1327 audit(1734098312.930:1390): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:32.930000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:33.547315 systemd[1]: Started sshd@13-10.0.0.25:22-10.0.0.1:53896.service. Dec 13 13:58:33.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.25:22-10.0.0.1:53896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:33.551568 kernel: audit: type=1130 audit(1734098313.546:1391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.25:22-10.0.0.1:53896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:33.611000 audit[4507]: USER_ACCT pid=4507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:33.613776 sshd[4507]: Accepted publickey for core from 10.0.0.1 port 53896 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:33.616333 sshd[4507]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:33.612000 audit[4507]: CRED_ACQ pid=4507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:33.619813 kernel: audit: type=1101 audit(1734098313.611:1392): pid=4507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:33.619904 kernel: audit: type=1103 audit(1734098313.612:1393): pid=4507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:33.619991 kernel: audit: type=1006 audit(1734098313.612:1394): pid=4507 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 13:58:33.612000 audit[4507]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffa9cfbe0 a2=3 a3=1 items=0 ppid=1 pid=4507 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:33.612000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:33.625860 systemd-logind[1210]: New session 14 of user core. Dec 13 13:58:33.626751 systemd[1]: Started session-14.scope. Dec 13 13:58:33.629000 audit[4507]: USER_START pid=4507 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:33.630000 audit[4509]: CRED_ACQ pid=4509 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:33.789055 sshd[4507]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:33.788000 audit[4507]: USER_END pid=4507 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:33.788000 audit[4507]: CRED_DISP pid=4507 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:33.791664 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 13:58:33.792182 systemd-logind[1210]: Session 14 logged out. Waiting for processes to exit. Dec 13 13:58:33.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.25:22-10.0.0.1:53896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:33.792318 systemd[1]: sshd@13-10.0.0.25:22-10.0.0.1:53896.service: Deactivated successfully. Dec 13 13:58:33.793294 systemd-logind[1210]: Removed session 14. Dec 13 13:58:33.802000 audit[4481]: AVC avc: denied { watch } for pid=4481 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_13_58_12.96184484/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c770 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c645,c770 tclass=file permissive=0 Dec 13 13:58:33.802000 audit[4481]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40020d2260 a2=fc6 a3=0 items=0 ppid=4296 pid=4481 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c770 key=(null) Dec 13 13:58:33.802000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 13:58:33.896297 kubelet[2074]: I1213 13:58:33.896263 2074 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 13:58:38.793825 systemd[1]: Started sshd@14-10.0.0.25:22-10.0.0.1:53900.service. Dec 13 13:58:38.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.25:22-10.0.0.1:53900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:38.794675 kernel: kauditd_printk_skb: 10 callbacks suppressed Dec 13 13:58:38.794741 kernel: audit: type=1130 audit(1734098318.793:1401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.25:22-10.0.0.1:53900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:38.836000 audit[4525]: USER_ACCT pid=4525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:38.837069 sshd[4525]: Accepted publickey for core from 10.0.0.1 port 53900 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:38.840134 sshd[4525]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:38.839000 audit[4525]: CRED_ACQ pid=4525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:38.843099 kernel: audit: type=1101 audit(1734098318.836:1402): pid=4525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:38.843156 kernel: audit: type=1103 audit(1734098318.839:1403): pid=4525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:38.845257 kernel: audit: type=1006 audit(1734098318.839:1404): pid=4525 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 13:58:38.839000 audit[4525]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff32b5fb0 a2=3 a3=1 items=0 ppid=1 pid=4525 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:38.849000 kernel: audit: type=1300 audit(1734098318.839:1404): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff32b5fb0 a2=3 a3=1 items=0 ppid=1 pid=4525 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:38.839000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:38.850267 kernel: audit: type=1327 audit(1734098318.839:1404): proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:38.851472 systemd-logind[1210]: New session 15 of user core. Dec 13 13:58:38.852338 systemd[1]: Started session-15.scope. Dec 13 13:58:38.855000 audit[4525]: USER_START pid=4525 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:38.859490 kernel: audit: type=1105 audit(1734098318.855:1405): pid=4525 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:38.859000 audit[4527]: CRED_ACQ pid=4527 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:38.863501 kernel: audit: type=1103 audit(1734098318.859:1406): pid=4527 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:38.990120 sshd[4525]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:38.990000 audit[4525]: USER_END pid=4525 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:38.994845 systemd[1]: sshd@14-10.0.0.25:22-10.0.0.1:53900.service: Deactivated successfully. Dec 13 13:58:38.990000 audit[4525]: CRED_DISP pid=4525 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:38.995631 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 13:58:38.998279 kernel: audit: type=1106 audit(1734098318.990:1407): pid=4525 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:38.998338 kernel: audit: type=1104 audit(1734098318.990:1408): pid=4525 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:38.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.25:22-10.0.0.1:53900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:38.998709 systemd-logind[1210]: Session 15 logged out. Waiting for processes to exit. Dec 13 13:58:38.999420 systemd-logind[1210]: Removed session 15. Dec 13 13:58:39.246000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:58:39.246000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:58:39.246000 audit[1952]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=40095aeb70 a2=fc6 a3=0 items=0 ppid=1783 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 key=(null) Dec 13 13:58:39.246000 audit[1952]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=4009bee960 a2=fc6 a3=0 items=0 ppid=1783 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 key=(null) Dec 13 13:58:39.246000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 13:58:39.246000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 13:58:39.246000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:58:39.246000 audit[1952]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=40053d7080 a2=fc6 a3=0 items=0 ppid=1783 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 key=(null) Dec 13 13:58:39.246000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 13:58:39.250000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:58:39.250000 audit[1952]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=4009bee9c0 a2=fc6 a3=0 items=0 ppid=1783 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 key=(null) Dec 13 13:58:39.250000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 13:58:39.261000 audit[1959]: AVC avc: denied { watch } for pid=1959 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:58:39.261000 audit[1959]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002dd4900 a2=fc6 a3=0 items=0 ppid=1784 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 key=(null) Dec 13 13:58:39.261000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 13:58:39.261000 audit[1959]: AVC avc: denied { watch } for pid=1959 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:58:39.261000 audit[1959]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002436510 a2=fc6 a3=0 items=0 ppid=1784 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 key=(null) Dec 13 13:58:39.261000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 13:58:39.289000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:58:39.289000 audit[1952]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=40042040c0 a2=fc6 a3=0 items=0 ppid=1783 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 key=(null) Dec 13 13:58:39.289000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 13:58:39.289000 audit[1952]: AVC avc: denied { watch } for pid=1952 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:58:39.289000 audit[1952]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=40102343c0 a2=fc6 a3=0 items=0 ppid=1783 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c411,c465 key=(null) Dec 13 13:58:39.289000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3235002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 13:58:42.695443 env[1222]: time="2024-12-13T13:58:42.695345739Z" level=info msg="StopPodSandbox for \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\"" Dec 13 13:58:42.777562 env[1222]: 2024-12-13 13:58:42.732 [WARNING][4560] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--n5nx7-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"7240c606-a927-478a-a105-0915e83b4114", ResourceVersion:"939", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 57, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647", Pod:"coredns-76f75df574-n5nx7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8c697285bb0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:42.777562 env[1222]: 2024-12-13 13:58:42.732 [INFO][4560] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Dec 13 13:58:42.777562 env[1222]: 2024-12-13 13:58:42.732 [INFO][4560] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" iface="eth0" netns="" Dec 13 13:58:42.777562 env[1222]: 2024-12-13 13:58:42.733 [INFO][4560] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Dec 13 13:58:42.777562 env[1222]: 2024-12-13 13:58:42.733 [INFO][4560] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Dec 13 13:58:42.777562 env[1222]: 2024-12-13 13:58:42.764 [INFO][4570] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" HandleID="k8s-pod-network.70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Workload="localhost-k8s-coredns--76f75df574--n5nx7-eth0" Dec 13 13:58:42.777562 env[1222]: 2024-12-13 13:58:42.764 [INFO][4570] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:42.777562 env[1222]: 2024-12-13 13:58:42.764 [INFO][4570] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:42.777562 env[1222]: 2024-12-13 13:58:42.772 [WARNING][4570] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" HandleID="k8s-pod-network.70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Workload="localhost-k8s-coredns--76f75df574--n5nx7-eth0" Dec 13 13:58:42.777562 env[1222]: 2024-12-13 13:58:42.772 [INFO][4570] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" HandleID="k8s-pod-network.70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Workload="localhost-k8s-coredns--76f75df574--n5nx7-eth0" Dec 13 13:58:42.777562 env[1222]: 2024-12-13 13:58:42.773 [INFO][4570] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:42.777562 env[1222]: 2024-12-13 13:58:42.775 [INFO][4560] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Dec 13 13:58:42.778080 env[1222]: time="2024-12-13T13:58:42.777577229Z" level=info msg="TearDown network for sandbox \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\" successfully" Dec 13 13:58:42.778080 env[1222]: time="2024-12-13T13:58:42.777604751Z" level=info msg="StopPodSandbox for \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\" returns successfully" Dec 13 13:58:42.778080 env[1222]: time="2024-12-13T13:58:42.778007982Z" level=info msg="RemovePodSandbox for \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\"" Dec 13 13:58:42.778080 env[1222]: time="2024-12-13T13:58:42.778038465Z" level=info msg="Forcibly stopping sandbox \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\"" Dec 13 13:58:42.812206 systemd[1]: run-containerd-runc-k8s.io-bcc4892ccd4a792f0f811b613dad10e34c532ec0a83a3a90724ec79dcf4aea1b-runc.zSOi8o.mount: Deactivated successfully. Dec 13 13:58:42.861421 env[1222]: 2024-12-13 13:58:42.818 [WARNING][4593] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--n5nx7-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"7240c606-a927-478a-a105-0915e83b4114", ResourceVersion:"939", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 57, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fb4c465b91f8cf628ae47fd6c21541b84f8813a66bd4f22953e4191e979e6647", Pod:"coredns-76f75df574-n5nx7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8c697285bb0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:42.861421 env[1222]: 2024-12-13 13:58:42.818 [INFO][4593] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Dec 13 13:58:42.861421 env[1222]: 2024-12-13 13:58:42.818 [INFO][4593] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" iface="eth0" netns="" Dec 13 13:58:42.861421 env[1222]: 2024-12-13 13:58:42.818 [INFO][4593] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Dec 13 13:58:42.861421 env[1222]: 2024-12-13 13:58:42.818 [INFO][4593] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Dec 13 13:58:42.861421 env[1222]: 2024-12-13 13:58:42.847 [INFO][4610] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" HandleID="k8s-pod-network.70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Workload="localhost-k8s-coredns--76f75df574--n5nx7-eth0" Dec 13 13:58:42.861421 env[1222]: 2024-12-13 13:58:42.847 [INFO][4610] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:42.861421 env[1222]: 2024-12-13 13:58:42.847 [INFO][4610] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:42.861421 env[1222]: 2024-12-13 13:58:42.856 [WARNING][4610] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" HandleID="k8s-pod-network.70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Workload="localhost-k8s-coredns--76f75df574--n5nx7-eth0" Dec 13 13:58:42.861421 env[1222]: 2024-12-13 13:58:42.856 [INFO][4610] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" HandleID="k8s-pod-network.70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Workload="localhost-k8s-coredns--76f75df574--n5nx7-eth0" Dec 13 13:58:42.861421 env[1222]: 2024-12-13 13:58:42.857 [INFO][4610] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:42.861421 env[1222]: 2024-12-13 13:58:42.859 [INFO][4593] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b" Dec 13 13:58:42.861869 env[1222]: time="2024-12-13T13:58:42.861442805Z" level=info msg="TearDown network for sandbox \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\" successfully" Dec 13 13:58:42.872159 env[1222]: time="2024-12-13T13:58:42.872123753Z" level=info msg="RemovePodSandbox \"70ae037bb53e496d56ff82380b45394095a07658bbccd125cfd2d4687822ca0b\" returns successfully" Dec 13 13:58:42.872681 env[1222]: time="2024-12-13T13:58:42.872650713Z" level=info msg="StopPodSandbox for \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\"" Dec 13 13:58:42.945435 env[1222]: 2024-12-13 13:58:42.910 [WARNING][4645] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0", GenerateName:"calico-apiserver-75546fc5b6-", Namespace:"calico-apiserver", SelfLink:"", UID:"e16f1cb8-65ba-4680-b325-d517863e2a42", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75546fc5b6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e", Pod:"calico-apiserver-75546fc5b6-rqjk9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1817aaeafef", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:42.945435 env[1222]: 2024-12-13 13:58:42.910 [INFO][4645] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Dec 13 13:58:42.945435 env[1222]: 2024-12-13 13:58:42.910 [INFO][4645] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" iface="eth0" netns="" Dec 13 13:58:42.945435 env[1222]: 2024-12-13 13:58:42.910 [INFO][4645] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Dec 13 13:58:42.945435 env[1222]: 2024-12-13 13:58:42.910 [INFO][4645] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Dec 13 13:58:42.945435 env[1222]: 2024-12-13 13:58:42.931 [INFO][4652] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" HandleID="k8s-pod-network.0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Workload="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0" Dec 13 13:58:42.945435 env[1222]: 2024-12-13 13:58:42.931 [INFO][4652] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:42.945435 env[1222]: 2024-12-13 13:58:42.931 [INFO][4652] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:42.945435 env[1222]: 2024-12-13 13:58:42.939 [WARNING][4652] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" HandleID="k8s-pod-network.0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Workload="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0" Dec 13 13:58:42.945435 env[1222]: 2024-12-13 13:58:42.939 [INFO][4652] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" HandleID="k8s-pod-network.0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Workload="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0" Dec 13 13:58:42.945435 env[1222]: 2024-12-13 13:58:42.941 [INFO][4652] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:42.945435 env[1222]: 2024-12-13 13:58:42.943 [INFO][4645] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Dec 13 13:58:42.945901 env[1222]: time="2024-12-13T13:58:42.945459873Z" level=info msg="TearDown network for sandbox \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\" successfully" Dec 13 13:58:42.945901 env[1222]: time="2024-12-13T13:58:42.945492596Z" level=info msg="StopPodSandbox for \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\" returns successfully" Dec 13 13:58:42.945901 env[1222]: time="2024-12-13T13:58:42.945872545Z" level=info msg="RemovePodSandbox for \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\"" Dec 13 13:58:42.945981 env[1222]: time="2024-12-13T13:58:42.945903427Z" level=info msg="Forcibly stopping sandbox \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\"" Dec 13 13:58:43.009662 kubelet[2074]: I1213 13:58:43.009625 2074 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 13:58:43.015992 env[1222]: 2024-12-13 13:58:42.981 [WARNING][4675] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0", GenerateName:"calico-apiserver-75546fc5b6-", Namespace:"calico-apiserver", SelfLink:"", UID:"e16f1cb8-65ba-4680-b325-d517863e2a42", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75546fc5b6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2e111fca62b8ab6a8cc468f28832a799e40215ea90706cb16a9548cbccfbe84e", Pod:"calico-apiserver-75546fc5b6-rqjk9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1817aaeafef", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:43.015992 env[1222]: 2024-12-13 13:58:42.981 [INFO][4675] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Dec 13 13:58:43.015992 env[1222]: 2024-12-13 13:58:42.981 [INFO][4675] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" iface="eth0" netns="" Dec 13 13:58:43.015992 env[1222]: 2024-12-13 13:58:42.981 [INFO][4675] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Dec 13 13:58:43.015992 env[1222]: 2024-12-13 13:58:42.981 [INFO][4675] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Dec 13 13:58:43.015992 env[1222]: 2024-12-13 13:58:43.000 [INFO][4682] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" HandleID="k8s-pod-network.0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Workload="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0" Dec 13 13:58:43.015992 env[1222]: 2024-12-13 13:58:43.000 [INFO][4682] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:43.015992 env[1222]: 2024-12-13 13:58:43.000 [INFO][4682] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:43.015992 env[1222]: 2024-12-13 13:58:43.008 [WARNING][4682] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" HandleID="k8s-pod-network.0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Workload="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0" Dec 13 13:58:43.015992 env[1222]: 2024-12-13 13:58:43.008 [INFO][4682] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" HandleID="k8s-pod-network.0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Workload="localhost-k8s-calico--apiserver--75546fc5b6--rqjk9-eth0" Dec 13 13:58:43.015992 env[1222]: 2024-12-13 13:58:43.010 [INFO][4682] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:43.015992 env[1222]: 2024-12-13 13:58:43.013 [INFO][4675] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48" Dec 13 13:58:43.015992 env[1222]: time="2024-12-13T13:58:43.015333315Z" level=info msg="TearDown network for sandbox \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\" successfully" Dec 13 13:58:43.019606 env[1222]: time="2024-12-13T13:58:43.019571520Z" level=info msg="RemovePodSandbox \"0600937b890988d0e070f235319d27282130d5e58f4b5d863458570acdfe7f48\" returns successfully" Dec 13 13:58:43.020853 env[1222]: time="2024-12-13T13:58:43.020815895Z" level=info msg="StopPodSandbox for \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\"" Dec 13 13:58:43.038000 audit[4707]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=4707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:43.038000 audit[4707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd2de78b0 a2=0 a3=1 items=0 ppid=2234 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:43.038000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:43.043000 audit[4707]: NETFILTER_CFG table=nat:122 family=2 entries=34 op=nft_register_chain pid=4707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:43.043000 audit[4707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffd2de78b0 a2=0 a3=1 items=0 ppid=2234 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:43.043000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:43.102045 env[1222]: 2024-12-13 13:58:43.070 [WARNING][4708] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--674z4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa", ResourceVersion:"1014", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de", Pod:"csi-node-driver-674z4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif443f41f95a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:43.102045 env[1222]: 2024-12-13 13:58:43.070 [INFO][4708] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Dec 13 13:58:43.102045 env[1222]: 2024-12-13 13:58:43.070 [INFO][4708] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" iface="eth0" netns="" Dec 13 13:58:43.102045 env[1222]: 2024-12-13 13:58:43.070 [INFO][4708] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Dec 13 13:58:43.102045 env[1222]: 2024-12-13 13:58:43.070 [INFO][4708] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Dec 13 13:58:43.102045 env[1222]: 2024-12-13 13:58:43.089 [INFO][4716] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" HandleID="k8s-pod-network.dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Workload="localhost-k8s-csi--node--driver--674z4-eth0" Dec 13 13:58:43.102045 env[1222]: 2024-12-13 13:58:43.089 [INFO][4716] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:43.102045 env[1222]: 2024-12-13 13:58:43.089 [INFO][4716] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:43.102045 env[1222]: 2024-12-13 13:58:43.097 [WARNING][4716] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" HandleID="k8s-pod-network.dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Workload="localhost-k8s-csi--node--driver--674z4-eth0" Dec 13 13:58:43.102045 env[1222]: 2024-12-13 13:58:43.097 [INFO][4716] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" HandleID="k8s-pod-network.dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Workload="localhost-k8s-csi--node--driver--674z4-eth0" Dec 13 13:58:43.102045 env[1222]: 2024-12-13 13:58:43.098 [INFO][4716] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:43.102045 env[1222]: 2024-12-13 13:58:43.100 [INFO][4708] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Dec 13 13:58:43.102498 env[1222]: time="2024-12-13T13:58:43.102072047Z" level=info msg="TearDown network for sandbox \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\" successfully" Dec 13 13:58:43.102498 env[1222]: time="2024-12-13T13:58:43.102102289Z" level=info msg="StopPodSandbox for \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\" returns successfully" Dec 13 13:58:43.102918 env[1222]: time="2024-12-13T13:58:43.102889149Z" level=info msg="RemovePodSandbox for \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\"" Dec 13 13:58:43.102972 env[1222]: time="2024-12-13T13:58:43.102922352Z" level=info msg="Forcibly stopping sandbox \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\"" Dec 13 13:58:43.175217 env[1222]: 2024-12-13 13:58:43.136 [WARNING][4738] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--674z4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5c2cb822-4ee9-4ba9-ab95-4dd7188c73aa", ResourceVersion:"1014", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b309b84fdd17f94dc34b8aef3cc8c1596987fd83a680cba5bdac6e80686f64de", Pod:"csi-node-driver-674z4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif443f41f95a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:43.175217 env[1222]: 2024-12-13 13:58:43.136 [INFO][4738] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Dec 13 13:58:43.175217 env[1222]: 2024-12-13 13:58:43.136 [INFO][4738] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" iface="eth0" netns="" Dec 13 13:58:43.175217 env[1222]: 2024-12-13 13:58:43.136 [INFO][4738] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Dec 13 13:58:43.175217 env[1222]: 2024-12-13 13:58:43.136 [INFO][4738] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Dec 13 13:58:43.175217 env[1222]: 2024-12-13 13:58:43.162 [INFO][4746] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" HandleID="k8s-pod-network.dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Workload="localhost-k8s-csi--node--driver--674z4-eth0" Dec 13 13:58:43.175217 env[1222]: 2024-12-13 13:58:43.162 [INFO][4746] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:43.175217 env[1222]: 2024-12-13 13:58:43.162 [INFO][4746] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:43.175217 env[1222]: 2024-12-13 13:58:43.170 [WARNING][4746] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" HandleID="k8s-pod-network.dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Workload="localhost-k8s-csi--node--driver--674z4-eth0" Dec 13 13:58:43.175217 env[1222]: 2024-12-13 13:58:43.170 [INFO][4746] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" HandleID="k8s-pod-network.dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Workload="localhost-k8s-csi--node--driver--674z4-eth0" Dec 13 13:58:43.175217 env[1222]: 2024-12-13 13:58:43.171 [INFO][4746] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:43.175217 env[1222]: 2024-12-13 13:58:43.173 [INFO][4738] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce" Dec 13 13:58:43.175657 env[1222]: time="2024-12-13T13:58:43.175232817Z" level=info msg="TearDown network for sandbox \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\" successfully" Dec 13 13:58:43.177996 env[1222]: time="2024-12-13T13:58:43.177954346Z" level=info msg="RemovePodSandbox \"dbbd637eda2597e0b109688cb4b3c726da1c7cdfd4848a5112e91e81e20b8fce\" returns successfully" Dec 13 13:58:43.178504 env[1222]: time="2024-12-13T13:58:43.178436783Z" level=info msg="StopPodSandbox for \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\"" Dec 13 13:58:43.252566 env[1222]: 2024-12-13 13:58:43.212 [WARNING][4769] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0", GenerateName:"calico-apiserver-75546fc5b6-", Namespace:"calico-apiserver", SelfLink:"", UID:"abfada76-ba20-42c7-9bea-d459bdb5d231", ResourceVersion:"1029", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75546fc5b6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52", Pod:"calico-apiserver-75546fc5b6-6f6gc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali02d9551259c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:43.252566 env[1222]: 2024-12-13 13:58:43.212 [INFO][4769] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Dec 13 13:58:43.252566 env[1222]: 2024-12-13 13:58:43.212 [INFO][4769] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" iface="eth0" netns="" Dec 13 13:58:43.252566 env[1222]: 2024-12-13 13:58:43.212 [INFO][4769] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Dec 13 13:58:43.252566 env[1222]: 2024-12-13 13:58:43.212 [INFO][4769] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Dec 13 13:58:43.252566 env[1222]: 2024-12-13 13:58:43.231 [INFO][4778] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" HandleID="k8s-pod-network.ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Workload="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0" Dec 13 13:58:43.252566 env[1222]: 2024-12-13 13:58:43.232 [INFO][4778] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:43.252566 env[1222]: 2024-12-13 13:58:43.232 [INFO][4778] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:43.252566 env[1222]: 2024-12-13 13:58:43.243 [WARNING][4778] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" HandleID="k8s-pod-network.ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Workload="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0" Dec 13 13:58:43.252566 env[1222]: 2024-12-13 13:58:43.243 [INFO][4778] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" HandleID="k8s-pod-network.ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Workload="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0" Dec 13 13:58:43.252566 env[1222]: 2024-12-13 13:58:43.245 [INFO][4778] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:43.252566 env[1222]: 2024-12-13 13:58:43.246 [INFO][4769] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Dec 13 13:58:43.252566 env[1222]: time="2024-12-13T13:58:43.248741855Z" level=info msg="TearDown network for sandbox \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\" successfully" Dec 13 13:58:43.252566 env[1222]: time="2024-12-13T13:58:43.248773337Z" level=info msg="StopPodSandbox for \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\" returns successfully" Dec 13 13:58:43.252566 env[1222]: time="2024-12-13T13:58:43.249206210Z" level=info msg="RemovePodSandbox for \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\"" Dec 13 13:58:43.252566 env[1222]: time="2024-12-13T13:58:43.249237013Z" level=info msg="Forcibly stopping sandbox \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\"" Dec 13 13:58:43.318768 env[1222]: 2024-12-13 13:58:43.285 [WARNING][4802] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0", GenerateName:"calico-apiserver-75546fc5b6-", Namespace:"calico-apiserver", SelfLink:"", UID:"abfada76-ba20-42c7-9bea-d459bdb5d231", ResourceVersion:"1029", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"75546fc5b6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7dbdea1367c37ed0c5fc023ee8a5c7d06f8c1ab7ab0ed5577cb1d520c62ccc52", Pod:"calico-apiserver-75546fc5b6-6f6gc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali02d9551259c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:43.318768 env[1222]: 2024-12-13 13:58:43.285 [INFO][4802] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Dec 13 13:58:43.318768 env[1222]: 2024-12-13 13:58:43.285 [INFO][4802] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" iface="eth0" netns="" Dec 13 13:58:43.318768 env[1222]: 2024-12-13 13:58:43.285 [INFO][4802] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Dec 13 13:58:43.318768 env[1222]: 2024-12-13 13:58:43.285 [INFO][4802] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Dec 13 13:58:43.318768 env[1222]: 2024-12-13 13:58:43.305 [INFO][4810] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" HandleID="k8s-pod-network.ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Workload="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0" Dec 13 13:58:43.318768 env[1222]: 2024-12-13 13:58:43.305 [INFO][4810] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:43.318768 env[1222]: 2024-12-13 13:58:43.306 [INFO][4810] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:43.318768 env[1222]: 2024-12-13 13:58:43.313 [WARNING][4810] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" HandleID="k8s-pod-network.ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Workload="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0" Dec 13 13:58:43.318768 env[1222]: 2024-12-13 13:58:43.313 [INFO][4810] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" HandleID="k8s-pod-network.ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Workload="localhost-k8s-calico--apiserver--75546fc5b6--6f6gc-eth0" Dec 13 13:58:43.318768 env[1222]: 2024-12-13 13:58:43.315 [INFO][4810] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:43.318768 env[1222]: 2024-12-13 13:58:43.316 [INFO][4802] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1" Dec 13 13:58:43.319198 env[1222]: time="2024-12-13T13:58:43.318788707Z" level=info msg="TearDown network for sandbox \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\" successfully" Dec 13 13:58:43.321539 env[1222]: time="2024-12-13T13:58:43.321503875Z" level=info msg="RemovePodSandbox \"ae7007c56575a0cadc6ad626114f7d3377183bc8c8f7d3d22013becb80c080f1\" returns successfully" Dec 13 13:58:43.322009 env[1222]: time="2024-12-13T13:58:43.321970071Z" level=info msg="StopPodSandbox for \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\"" Dec 13 13:58:43.390728 env[1222]: 2024-12-13 13:58:43.356 [WARNING][4832] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0", GenerateName:"calico-kube-controllers-6bcd7c76ff-", Namespace:"calico-system", SelfLink:"", UID:"07ffb936-3e31-41ba-bf8f-d41af42cec36", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bcd7c76ff", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816", Pod:"calico-kube-controllers-6bcd7c76ff-25fc7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali16773194782", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:43.390728 env[1222]: 2024-12-13 13:58:43.356 [INFO][4832] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Dec 13 13:58:43.390728 env[1222]: 2024-12-13 13:58:43.356 [INFO][4832] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" iface="eth0" netns="" Dec 13 13:58:43.390728 env[1222]: 2024-12-13 13:58:43.357 [INFO][4832] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Dec 13 13:58:43.390728 env[1222]: 2024-12-13 13:58:43.357 [INFO][4832] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Dec 13 13:58:43.390728 env[1222]: 2024-12-13 13:58:43.376 [INFO][4840] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" HandleID="k8s-pod-network.5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Workload="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0" Dec 13 13:58:43.390728 env[1222]: 2024-12-13 13:58:43.376 [INFO][4840] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:43.390728 env[1222]: 2024-12-13 13:58:43.376 [INFO][4840] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:43.390728 env[1222]: 2024-12-13 13:58:43.385 [WARNING][4840] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" HandleID="k8s-pod-network.5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Workload="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0" Dec 13 13:58:43.390728 env[1222]: 2024-12-13 13:58:43.385 [INFO][4840] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" HandleID="k8s-pod-network.5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Workload="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0" Dec 13 13:58:43.390728 env[1222]: 2024-12-13 13:58:43.387 [INFO][4840] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:43.390728 env[1222]: 2024-12-13 13:58:43.388 [INFO][4832] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Dec 13 13:58:43.391216 env[1222]: time="2024-12-13T13:58:43.390755866Z" level=info msg="TearDown network for sandbox \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\" successfully" Dec 13 13:58:43.391216 env[1222]: time="2024-12-13T13:58:43.390786388Z" level=info msg="StopPodSandbox for \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\" returns successfully" Dec 13 13:58:43.391765 env[1222]: time="2024-12-13T13:58:43.391736101Z" level=info msg="RemovePodSandbox for \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\"" Dec 13 13:58:43.391914 env[1222]: time="2024-12-13T13:58:43.391860390Z" level=info msg="Forcibly stopping sandbox \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\"" Dec 13 13:58:43.459169 env[1222]: 2024-12-13 13:58:43.427 [WARNING][4865] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0", GenerateName:"calico-kube-controllers-6bcd7c76ff-", Namespace:"calico-system", SelfLink:"", UID:"07ffb936-3e31-41ba-bf8f-d41af42cec36", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bcd7c76ff", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8f6c791f58a441d95c17fac64526ec818fe970e058df13a1f61ed4733adba816", Pod:"calico-kube-controllers-6bcd7c76ff-25fc7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali16773194782", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:43.459169 env[1222]: 2024-12-13 13:58:43.427 [INFO][4865] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Dec 13 13:58:43.459169 env[1222]: 2024-12-13 13:58:43.427 [INFO][4865] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" iface="eth0" netns="" Dec 13 13:58:43.459169 env[1222]: 2024-12-13 13:58:43.427 [INFO][4865] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Dec 13 13:58:43.459169 env[1222]: 2024-12-13 13:58:43.427 [INFO][4865] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Dec 13 13:58:43.459169 env[1222]: 2024-12-13 13:58:43.446 [INFO][4873] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" HandleID="k8s-pod-network.5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Workload="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0" Dec 13 13:58:43.459169 env[1222]: 2024-12-13 13:58:43.446 [INFO][4873] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:43.459169 env[1222]: 2024-12-13 13:58:43.446 [INFO][4873] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:43.459169 env[1222]: 2024-12-13 13:58:43.454 [WARNING][4873] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" HandleID="k8s-pod-network.5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Workload="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0" Dec 13 13:58:43.459169 env[1222]: 2024-12-13 13:58:43.454 [INFO][4873] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" HandleID="k8s-pod-network.5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Workload="localhost-k8s-calico--kube--controllers--6bcd7c76ff--25fc7-eth0" Dec 13 13:58:43.459169 env[1222]: 2024-12-13 13:58:43.455 [INFO][4873] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:43.459169 env[1222]: 2024-12-13 13:58:43.457 [INFO][4865] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7" Dec 13 13:58:43.459784 env[1222]: time="2024-12-13T13:58:43.459747957Z" level=info msg="TearDown network for sandbox \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\" successfully" Dec 13 13:58:43.462475 env[1222]: time="2024-12-13T13:58:43.462426042Z" level=info msg="RemovePodSandbox \"5c27746eef9258dd0389aa1b5d800606c70344d8f7b49ffd22340fa5e92a3ad7\" returns successfully" Dec 13 13:58:43.463051 env[1222]: time="2024-12-13T13:58:43.463014687Z" level=info msg="StopPodSandbox for \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\"" Dec 13 13:58:43.528775 env[1222]: 2024-12-13 13:58:43.495 [WARNING][4895] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--79klx-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"27e8634a-86dc-4fd9-be3d-789a986b1796", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 57, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda", Pod:"coredns-76f75df574-79klx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid784a9021da", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:43.528775 env[1222]: 2024-12-13 13:58:43.495 [INFO][4895] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Dec 13 13:58:43.528775 env[1222]: 2024-12-13 13:58:43.495 [INFO][4895] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" iface="eth0" netns="" Dec 13 13:58:43.528775 env[1222]: 2024-12-13 13:58:43.495 [INFO][4895] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Dec 13 13:58:43.528775 env[1222]: 2024-12-13 13:58:43.495 [INFO][4895] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Dec 13 13:58:43.528775 env[1222]: 2024-12-13 13:58:43.514 [INFO][4902] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" HandleID="k8s-pod-network.99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Workload="localhost-k8s-coredns--76f75df574--79klx-eth0" Dec 13 13:58:43.528775 env[1222]: 2024-12-13 13:58:43.514 [INFO][4902] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:43.528775 env[1222]: 2024-12-13 13:58:43.514 [INFO][4902] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:43.528775 env[1222]: 2024-12-13 13:58:43.523 [WARNING][4902] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" HandleID="k8s-pod-network.99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Workload="localhost-k8s-coredns--76f75df574--79klx-eth0" Dec 13 13:58:43.528775 env[1222]: 2024-12-13 13:58:43.523 [INFO][4902] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" HandleID="k8s-pod-network.99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Workload="localhost-k8s-coredns--76f75df574--79klx-eth0" Dec 13 13:58:43.528775 env[1222]: 2024-12-13 13:58:43.524 [INFO][4902] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:43.528775 env[1222]: 2024-12-13 13:58:43.526 [INFO][4895] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Dec 13 13:58:43.529193 env[1222]: time="2024-12-13T13:58:43.528801252Z" level=info msg="TearDown network for sandbox \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\" successfully" Dec 13 13:58:43.529193 env[1222]: time="2024-12-13T13:58:43.528833895Z" level=info msg="StopPodSandbox for \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\" returns successfully" Dec 13 13:58:43.529280 env[1222]: time="2024-12-13T13:58:43.529246446Z" level=info msg="RemovePodSandbox for \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\"" Dec 13 13:58:43.529315 env[1222]: time="2024-12-13T13:58:43.529284809Z" level=info msg="Forcibly stopping sandbox \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\"" Dec 13 13:58:43.588000 audit[1959]: AVC avc: denied { watch } for pid=1959 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:58:43.588000 audit[1959]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40026d8ce0 a2=fc6 a3=0 items=0 ppid=1784 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 key=(null) Dec 13 13:58:43.588000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 13:58:43.588000 audit[1959]: AVC avc: denied { watch } for pid=1959 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:58:43.588000 audit[1959]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40026d8d00 a2=fc6 a3=0 items=0 ppid=1784 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 key=(null) Dec 13 13:58:43.588000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 13:58:43.589000 audit[1959]: AVC avc: denied { watch } for pid=1959 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:58:43.589000 audit[1959]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002dd5660 a2=fc6 a3=0 items=0 ppid=1784 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 key=(null) Dec 13 13:58:43.589000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 13:58:43.589000 audit[1959]: AVC avc: denied { watch } for pid=1959 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 13:58:43.589000 audit[1959]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40011295c0 a2=fc6 a3=0 items=0 ppid=1784 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c146 key=(null) Dec 13 13:58:43.589000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 13:58:43.595749 env[1222]: 2024-12-13 13:58:43.562 [WARNING][4925] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--79klx-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"27e8634a-86dc-4fd9-be3d-789a986b1796", ResourceVersion:"980", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 57, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d5e669ee423a614f65ad3cd70a922d19d242d40665647fc1c21165849f639fda", Pod:"coredns-76f75df574-79klx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid784a9021da", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:43.595749 env[1222]: 2024-12-13 13:58:43.562 [INFO][4925] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Dec 13 13:58:43.595749 env[1222]: 2024-12-13 13:58:43.563 [INFO][4925] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" iface="eth0" netns="" Dec 13 13:58:43.595749 env[1222]: 2024-12-13 13:58:43.563 [INFO][4925] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Dec 13 13:58:43.595749 env[1222]: 2024-12-13 13:58:43.563 [INFO][4925] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Dec 13 13:58:43.595749 env[1222]: 2024-12-13 13:58:43.582 [INFO][4932] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" HandleID="k8s-pod-network.99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Workload="localhost-k8s-coredns--76f75df574--79klx-eth0" Dec 13 13:58:43.595749 env[1222]: 2024-12-13 13:58:43.582 [INFO][4932] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:43.595749 env[1222]: 2024-12-13 13:58:43.582 [INFO][4932] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:43.595749 env[1222]: 2024-12-13 13:58:43.590 [WARNING][4932] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" HandleID="k8s-pod-network.99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Workload="localhost-k8s-coredns--76f75df574--79klx-eth0" Dec 13 13:58:43.595749 env[1222]: 2024-12-13 13:58:43.590 [INFO][4932] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" HandleID="k8s-pod-network.99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Workload="localhost-k8s-coredns--76f75df574--79klx-eth0" Dec 13 13:58:43.595749 env[1222]: 2024-12-13 13:58:43.592 [INFO][4932] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:43.595749 env[1222]: 2024-12-13 13:58:43.593 [INFO][4925] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20" Dec 13 13:58:43.596222 env[1222]: time="2024-12-13T13:58:43.596176299Z" level=info msg="TearDown network for sandbox \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\" successfully" Dec 13 13:58:43.598998 env[1222]: time="2024-12-13T13:58:43.598962273Z" level=info msg="RemovePodSandbox \"99de92f0cce24e6a7c885f22bc0610e16369547b8fba81d69907c28af99eed20\" returns successfully" Dec 13 13:58:43.998990 kernel: kauditd_printk_skb: 43 callbacks suppressed Dec 13 13:58:43.999111 kernel: audit: type=1130 audit(1734098323.993:1424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.25:22-10.0.0.1:58524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:43.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.25:22-10.0.0.1:58524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:43.995058 systemd[1]: Started sshd@15-10.0.0.25:22-10.0.0.1:58524.service. Dec 13 13:58:44.036000 audit[4940]: USER_ACCT pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.038604 sshd[4940]: Accepted publickey for core from 10.0.0.1 port 58524 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:44.039082 sshd[4940]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:44.037000 audit[4940]: CRED_ACQ pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.043311 systemd[1]: Started session-16.scope. Dec 13 13:58:44.043498 kernel: audit: type=1101 audit(1734098324.036:1425): pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.043546 kernel: audit: type=1103 audit(1734098324.037:1426): pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.043564 kernel: audit: type=1006 audit(1734098324.037:1427): pid=4940 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 13:58:44.043859 systemd-logind[1210]: New session 16 of user core. Dec 13 13:58:44.037000 audit[4940]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff060f7b0 a2=3 a3=1 items=0 ppid=1 pid=4940 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:44.048257 kernel: audit: type=1300 audit(1734098324.037:1427): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff060f7b0 a2=3 a3=1 items=0 ppid=1 pid=4940 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:44.048316 kernel: audit: type=1327 audit(1734098324.037:1427): proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:44.037000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:44.046000 audit[4940]: USER_START pid=4940 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.052661 kernel: audit: type=1105 audit(1734098324.046:1428): pid=4940 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.052716 kernel: audit: type=1103 audit(1734098324.047:1429): pid=4942 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.047000 audit[4942]: CRED_ACQ pid=4942 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.178636 sshd[4940]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:44.180000 audit[4940]: USER_END pid=4940 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.182383 systemd[1]: Started sshd@16-10.0.0.25:22-10.0.0.1:58536.service. Dec 13 13:58:44.180000 audit[4940]: CRED_DISP pid=4940 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.185755 systemd[1]: sshd@15-10.0.0.25:22-10.0.0.1:58524.service: Deactivated successfully. Dec 13 13:58:44.186542 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 13:58:44.187685 systemd-logind[1210]: Session 16 logged out. Waiting for processes to exit. Dec 13 13:58:44.188117 kernel: audit: type=1106 audit(1734098324.180:1430): pid=4940 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.188155 kernel: audit: type=1104 audit(1734098324.180:1431): pid=4940 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.25:22-10.0.0.1:58536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:44.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.25:22-10.0.0.1:58524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:44.188593 systemd-logind[1210]: Removed session 16. Dec 13 13:58:44.221000 audit[4953]: USER_ACCT pid=4953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.222698 sshd[4953]: Accepted publickey for core from 10.0.0.1 port 58536 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:44.222000 audit[4953]: CRED_ACQ pid=4953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.222000 audit[4953]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffef92a2f0 a2=3 a3=1 items=0 ppid=1 pid=4953 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:44.222000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:44.224233 sshd[4953]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:44.228665 systemd-logind[1210]: New session 17 of user core. Dec 13 13:58:44.229125 systemd[1]: Started session-17.scope. Dec 13 13:58:44.233000 audit[4953]: USER_START pid=4953 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.235000 audit[4956]: CRED_ACQ pid=4956 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.471671 sshd[4953]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:44.472000 audit[4953]: USER_END pid=4953 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.472000 audit[4953]: CRED_DISP pid=4953 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.477193 systemd[1]: Started sshd@17-10.0.0.25:22-10.0.0.1:58540.service. Dec 13 13:58:44.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.25:22-10.0.0.1:58540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:44.479526 systemd[1]: sshd@16-10.0.0.25:22-10.0.0.1:58536.service: Deactivated successfully. Dec 13 13:58:44.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.25:22-10.0.0.1:58536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:44.480634 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 13:58:44.481357 systemd-logind[1210]: Session 17 logged out. Waiting for processes to exit. Dec 13 13:58:44.482068 systemd-logind[1210]: Removed session 17. Dec 13 13:58:44.515000 audit[4964]: USER_ACCT pid=4964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.516907 sshd[4964]: Accepted publickey for core from 10.0.0.1 port 58540 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:44.516000 audit[4964]: CRED_ACQ pid=4964 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.516000 audit[4964]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb1f9ad0 a2=3 a3=1 items=0 ppid=1 pid=4964 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:44.516000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:44.518166 sshd[4964]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:44.521736 systemd-logind[1210]: New session 18 of user core. Dec 13 13:58:44.523398 systemd[1]: Started session-18.scope. Dec 13 13:58:44.525000 audit[4964]: USER_START pid=4964 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:44.527000 audit[4967]: CRED_ACQ pid=4967 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:46.010000 audit[4980]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=4980 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:46.010000 audit[4980]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffc4260740 a2=0 a3=1 items=0 ppid=2234 pid=4980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:46.010000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:46.023227 sshd[4964]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:46.022000 audit[4980]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=4980 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:46.022000 audit[4980]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc4260740 a2=0 a3=1 items=0 ppid=2234 pid=4980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:46.022000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:46.025000 audit[4964]: USER_END pid=4964 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:46.025000 audit[4964]: CRED_DISP pid=4964 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:46.027958 systemd[1]: Started sshd@18-10.0.0.25:22-10.0.0.1:58548.service. Dec 13 13:58:46.028938 systemd-logind[1210]: Session 18 logged out. Waiting for processes to exit. Dec 13 13:58:46.029571 systemd[1]: sshd@17-10.0.0.25:22-10.0.0.1:58540.service: Deactivated successfully. Dec 13 13:58:46.030223 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 13:58:46.031528 systemd-logind[1210]: Removed session 18. Dec 13 13:58:46.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.25:22-10.0.0.1:58548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:46.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.25:22-10.0.0.1:58540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:46.044000 audit[4986]: NETFILTER_CFG table=filter:125 family=2 entries=32 op=nft_register_rule pid=4986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:46.044000 audit[4986]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffc81b94e0 a2=0 a3=1 items=0 ppid=2234 pid=4986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:46.044000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:46.050000 audit[4986]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=4986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:46.050000 audit[4986]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc81b94e0 a2=0 a3=1 items=0 ppid=2234 pid=4986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:46.050000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:46.064000 audit[4982]: USER_ACCT pid=4982 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:46.066647 sshd[4982]: Accepted publickey for core from 10.0.0.1 port 58548 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:46.066000 audit[4982]: CRED_ACQ pid=4982 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:46.066000 audit[4982]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9844190 a2=3 a3=1 items=0 ppid=1 pid=4982 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:46.066000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:46.068431 sshd[4982]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:46.075326 systemd[1]: Started session-19.scope. Dec 13 13:58:46.075483 systemd-logind[1210]: New session 19 of user core. Dec 13 13:58:46.078000 audit[4982]: USER_START pid=4982 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:46.079000 audit[4987]: CRED_ACQ pid=4987 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:46.350549 sshd[4982]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:46.355008 systemd[1]: Started sshd@19-10.0.0.25:22-10.0.0.1:58560.service. Dec 13 13:58:46.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.25:22-10.0.0.1:58560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:46.356000 audit[4982]: USER_END pid=4982 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:46.356000 audit[4982]: CRED_DISP pid=4982 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:46.361821 systemd[1]: sshd@18-10.0.0.25:22-10.0.0.1:58548.service: Deactivated successfully. Dec 13 13:58:46.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.25:22-10.0.0.1:58548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:46.364412 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 13:58:46.366106 systemd-logind[1210]: Session 19 logged out. Waiting for processes to exit. Dec 13 13:58:46.369744 systemd-logind[1210]: Removed session 19. Dec 13 13:58:46.392000 audit[4996]: USER_ACCT pid=4996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:46.393800 sshd[4996]: Accepted publickey for core from 10.0.0.1 port 58560 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:46.393000 audit[4996]: CRED_ACQ pid=4996 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:46.393000 audit[4996]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe59723f0 a2=3 a3=1 items=0 ppid=1 pid=4996 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:46.393000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:46.395067 sshd[4996]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:46.398802 systemd-logind[1210]: New session 20 of user core. Dec 13 13:58:46.399941 systemd[1]: Started session-20.scope. Dec 13 13:58:46.403000 audit[4996]: USER_START pid=4996 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:46.404000 audit[4999]: CRED_ACQ pid=4999 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:46.547714 sshd[4996]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:46.547000 audit[4996]: USER_END pid=4996 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:46.547000 audit[4996]: CRED_DISP pid=4996 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:46.550047 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 13:58:46.550684 systemd-logind[1210]: Session 20 logged out. Waiting for processes to exit. Dec 13 13:58:46.550831 systemd[1]: sshd@19-10.0.0.25:22-10.0.0.1:58560.service: Deactivated successfully. Dec 13 13:58:46.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.25:22-10.0.0.1:58560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:46.551891 systemd-logind[1210]: Removed session 20. Dec 13 13:58:51.350000 audit[5012]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=5012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:51.354372 kernel: kauditd_printk_skb: 57 callbacks suppressed Dec 13 13:58:51.354457 kernel: audit: type=1325 audit(1734098331.350:1473): table=filter:127 family=2 entries=20 op=nft_register_rule pid=5012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:51.354485 kernel: audit: type=1300 audit(1734098331.350:1473): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffdbe9f6d0 a2=0 a3=1 items=0 ppid=2234 pid=5012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:51.350000 audit[5012]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffdbe9f6d0 a2=0 a3=1 items=0 ppid=2234 pid=5012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:51.350000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:51.359942 kernel: audit: type=1327 audit(1734098331.350:1473): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:51.368000 audit[5012]: NETFILTER_CFG table=nat:128 family=2 entries=106 op=nft_register_chain pid=5012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:51.368000 audit[5012]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffdbe9f6d0 a2=0 a3=1 items=0 ppid=2234 pid=5012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:51.375895 kernel: audit: type=1325 audit(1734098331.368:1474): table=nat:128 family=2 entries=106 op=nft_register_chain pid=5012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:51.375930 kernel: audit: type=1300 audit(1734098331.368:1474): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffdbe9f6d0 a2=0 a3=1 items=0 ppid=2234 pid=5012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:51.375964 kernel: audit: type=1327 audit(1734098331.368:1474): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:51.368000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:51.552483 systemd[1]: Started sshd@20-10.0.0.25:22-10.0.0.1:58574.service. Dec 13 13:58:51.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.25:22-10.0.0.1:58574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:51.556500 kernel: audit: type=1130 audit(1734098331.551:1475): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.25:22-10.0.0.1:58574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:51.585000 audit[5015]: USER_ACCT pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:51.587511 sshd[5015]: Accepted publickey for core from 10.0.0.1 port 58574 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:51.588821 sshd[5015]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:51.587000 audit[5015]: CRED_ACQ pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:51.593326 kernel: audit: type=1101 audit(1734098331.585:1476): pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:51.593404 kernel: audit: type=1103 audit(1734098331.587:1477): pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:51.595566 kernel: audit: type=1006 audit(1734098331.587:1478): pid=5015 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Dec 13 13:58:51.587000 audit[5015]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7c731e0 a2=3 a3=1 items=0 ppid=1 pid=5015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:51.587000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:51.595307 systemd-logind[1210]: New session 21 of user core. Dec 13 13:58:51.596572 systemd[1]: Started session-21.scope. Dec 13 13:58:51.599000 audit[5015]: USER_START pid=5015 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:51.601000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:51.718390 sshd[5015]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:51.717000 audit[5015]: USER_END pid=5015 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:51.718000 audit[5015]: CRED_DISP pid=5015 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:51.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.25:22-10.0.0.1:58574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:51.721641 systemd[1]: sshd@20-10.0.0.25:22-10.0.0.1:58574.service: Deactivated successfully. Dec 13 13:58:51.722372 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 13:58:51.723214 systemd-logind[1210]: Session 21 logged out. Waiting for processes to exit. Dec 13 13:58:51.724166 systemd-logind[1210]: Removed session 21. Dec 13 13:58:56.722483 systemd[1]: Started sshd@21-10.0.0.25:22-10.0.0.1:42730.service. Dec 13 13:58:56.726280 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 13:58:56.726352 kernel: audit: type=1130 audit(1734098336.722:1484): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.25:22-10.0.0.1:42730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:56.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.25:22-10.0.0.1:42730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:56.759000 audit[5030]: USER_ACCT pid=5030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:56.760299 sshd[5030]: Accepted publickey for core from 10.0.0.1 port 42730 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:56.762162 sshd[5030]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:56.761000 audit[5030]: CRED_ACQ pid=5030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:56.766472 kernel: audit: type=1101 audit(1734098336.759:1485): pid=5030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:56.766541 kernel: audit: type=1103 audit(1734098336.761:1486): pid=5030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:56.767193 systemd-logind[1210]: New session 22 of user core. Dec 13 13:58:56.768561 kernel: audit: type=1006 audit(1734098336.761:1487): pid=5030 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 13:58:56.768608 kernel: audit: type=1300 audit(1734098336.761:1487): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc5c7ff0 a2=3 a3=1 items=0 ppid=1 pid=5030 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:56.761000 audit[5030]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc5c7ff0 a2=3 a3=1 items=0 ppid=1 pid=5030 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:56.768922 systemd[1]: Started session-22.scope. Dec 13 13:58:56.761000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:56.772687 kernel: audit: type=1327 audit(1734098336.761:1487): proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:56.777000 audit[5030]: USER_START pid=5030 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:56.778000 audit[5032]: CRED_ACQ pid=5032 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:56.784033 kernel: audit: type=1105 audit(1734098336.777:1488): pid=5030 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:56.784111 kernel: audit: type=1103 audit(1734098336.778:1489): pid=5032 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:56.898993 sshd[5030]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:56.900000 audit[5030]: USER_END pid=5030 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:56.902819 systemd[1]: sshd@21-10.0.0.25:22-10.0.0.1:42730.service: Deactivated successfully. Dec 13 13:58:56.903723 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 13:58:56.903824 systemd-logind[1210]: Session 22 logged out. Waiting for processes to exit. Dec 13 13:58:56.900000 audit[5030]: CRED_DISP pid=5030 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:56.904803 systemd-logind[1210]: Removed session 22. Dec 13 13:58:56.907534 kernel: audit: type=1106 audit(1734098336.900:1490): pid=5030 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:56.907596 kernel: audit: type=1104 audit(1734098336.900:1491): pid=5030 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:56.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.25:22-10.0.0.1:42730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:57.290494 kubelet[2074]: E1213 13:58:57.290272 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:59:00.699780 kubelet[2074]: E1213 13:59:00.699363 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:59:00.700688 kubelet[2074]: E1213 13:59:00.699706 2074 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:59:01.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.25:22-10.0.0.1:42744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:59:01.902863 systemd[1]: Started sshd@22-10.0.0.25:22-10.0.0.1:42744.service. Dec 13 13:59:01.903704 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 13:59:01.903745 kernel: audit: type=1130 audit(1734098341.902:1493): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.25:22-10.0.0.1:42744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:59:01.938000 audit[5076]: USER_ACCT pid=5076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:01.939573 sshd[5076]: Accepted publickey for core from 10.0.0.1 port 42744 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:59:01.942668 sshd[5076]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:59:01.940000 audit[5076]: CRED_ACQ pid=5076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:01.946403 kernel: audit: type=1101 audit(1734098341.938:1494): pid=5076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:01.946496 kernel: audit: type=1103 audit(1734098341.940:1495): pid=5076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:01.948948 kernel: audit: type=1006 audit(1734098341.940:1496): pid=5076 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 13:59:01.949013 kernel: audit: type=1300 audit(1734098341.940:1496): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffda1a510 a2=3 a3=1 items=0 ppid=1 pid=5076 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:01.940000 audit[5076]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffda1a510 a2=3 a3=1 items=0 ppid=1 pid=5076 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:01.948331 systemd-logind[1210]: New session 23 of user core. Dec 13 13:59:01.948807 systemd[1]: Started session-23.scope. Dec 13 13:59:01.940000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:59:01.952862 kernel: audit: type=1327 audit(1734098341.940:1496): proctitle=737368643A20636F7265205B707269765D Dec 13 13:59:01.954000 audit[5076]: USER_START pid=5076 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:01.955000 audit[5078]: CRED_ACQ pid=5078 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:01.961402 kernel: audit: type=1105 audit(1734098341.954:1497): pid=5076 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:01.961499 kernel: audit: type=1103 audit(1734098341.955:1498): pid=5078 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:02.059995 sshd[5076]: pam_unix(sshd:session): session closed for user core Dec 13 13:59:02.060000 audit[5076]: USER_END pid=5076 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:02.062231 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 13:59:02.062865 systemd-logind[1210]: Session 23 logged out. Waiting for processes to exit. Dec 13 13:59:02.062981 systemd[1]: sshd@22-10.0.0.25:22-10.0.0.1:42744.service: Deactivated successfully. Dec 13 13:59:02.064015 systemd-logind[1210]: Removed session 23. Dec 13 13:59:02.064468 kernel: audit: type=1106 audit(1734098342.060:1499): pid=5076 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:02.064524 kernel: audit: type=1104 audit(1734098342.060:1500): pid=5076 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:02.060000 audit[5076]: CRED_DISP pid=5076 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:02.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.25:22-10.0.0.1:42744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:59:07.064423 systemd[1]: Started sshd@23-10.0.0.25:22-10.0.0.1:46224.service. Dec 13 13:59:07.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.25:22-10.0.0.1:46224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:59:07.068025 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 13:59:07.068111 kernel: audit: type=1130 audit(1734098347.064:1502): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.25:22-10.0.0.1:46224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:59:07.098000 audit[5089]: USER_ACCT pid=5089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:07.099341 sshd[5089]: Accepted publickey for core from 10.0.0.1 port 46224 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:59:07.101925 sshd[5089]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:59:07.101000 audit[5089]: CRED_ACQ pid=5089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:07.105835 kernel: audit: type=1101 audit(1734098347.098:1503): pid=5089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:07.105922 kernel: audit: type=1103 audit(1734098347.101:1504): pid=5089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:07.105947 kernel: audit: type=1006 audit(1734098347.101:1505): pid=5089 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 13:59:07.105513 systemd-logind[1210]: New session 24 of user core. Dec 13 13:59:07.105977 systemd[1]: Started session-24.scope. Dec 13 13:59:07.107377 kernel: audit: type=1300 audit(1734098347.101:1505): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff474a6f0 a2=3 a3=1 items=0 ppid=1 pid=5089 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:07.101000 audit[5089]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff474a6f0 a2=3 a3=1 items=0 ppid=1 pid=5089 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:07.101000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:59:07.111833 kernel: audit: type=1327 audit(1734098347.101:1505): proctitle=737368643A20636F7265205B707269765D Dec 13 13:59:07.111863 kernel: audit: type=1105 audit(1734098347.110:1506): pid=5089 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:07.110000 audit[5089]: USER_START pid=5089 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:07.111000 audit[5091]: CRED_ACQ pid=5091 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:07.118182 kernel: audit: type=1103 audit(1734098347.111:1507): pid=5091 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:07.227878 sshd[5089]: pam_unix(sshd:session): session closed for user core Dec 13 13:59:07.228000 audit[5089]: USER_END pid=5089 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:07.230297 systemd[1]: sshd@23-10.0.0.25:22-10.0.0.1:46224.service: Deactivated successfully. Dec 13 13:59:07.231096 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 13:59:07.228000 audit[5089]: CRED_DISP pid=5089 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:07.235559 kernel: audit: type=1106 audit(1734098347.228:1508): pid=5089 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:07.235613 kernel: audit: type=1104 audit(1734098347.228:1509): pid=5089 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:59:07.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.25:22-10.0.0.1:46224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:59:07.236212 systemd-logind[1210]: Session 24 logged out. Waiting for processes to exit. Dec 13 13:59:07.236937 systemd-logind[1210]: Removed session 24.