Dec 13 14:17:13.710047 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Dec 13 14:17:13.710066 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Dec 13 12:58:58 -00 2024 Dec 13 14:17:13.710074 kernel: efi: EFI v2.70 by EDK II Dec 13 14:17:13.710080 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Dec 13 14:17:13.710085 kernel: random: crng init done Dec 13 14:17:13.710090 kernel: ACPI: Early table checksum verification disabled Dec 13 14:17:13.710097 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Dec 13 14:17:13.710103 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Dec 13 14:17:13.710109 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:17:13.710114 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:17:13.710120 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:17:13.710125 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:17:13.710130 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:17:13.710136 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:17:13.710143 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:17:13.710149 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:17:13.710155 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:17:13.710161 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Dec 13 14:17:13.710167 kernel: NUMA: Failed to initialise from firmware Dec 13 14:17:13.710173 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Dec 13 14:17:13.710178 kernel: NUMA: NODE_DATA [mem 0xdcb0a900-0xdcb0ffff] Dec 13 14:17:13.710184 kernel: Zone ranges: Dec 13 14:17:13.710190 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Dec 13 14:17:13.710197 kernel: DMA32 empty Dec 13 14:17:13.710202 kernel: Normal empty Dec 13 14:17:13.710208 kernel: Movable zone start for each node Dec 13 14:17:13.710213 kernel: Early memory node ranges Dec 13 14:17:13.710219 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Dec 13 14:17:13.710225 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Dec 13 14:17:13.710231 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Dec 13 14:17:13.710236 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Dec 13 14:17:13.710242 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Dec 13 14:17:13.710282 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Dec 13 14:17:13.710288 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Dec 13 14:17:13.710294 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Dec 13 14:17:13.710302 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Dec 13 14:17:13.710308 kernel: psci: probing for conduit method from ACPI. Dec 13 14:17:13.710313 kernel: psci: PSCIv1.1 detected in firmware. Dec 13 14:17:13.710319 kernel: psci: Using standard PSCI v0.2 function IDs Dec 13 14:17:13.710325 kernel: psci: Trusted OS migration not required Dec 13 14:17:13.710333 kernel: psci: SMC Calling Convention v1.1 Dec 13 14:17:13.710339 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Dec 13 14:17:13.710346 kernel: ACPI: SRAT not present Dec 13 14:17:13.710353 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Dec 13 14:17:13.710359 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Dec 13 14:17:13.710366 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Dec 13 14:17:13.710372 kernel: Detected PIPT I-cache on CPU0 Dec 13 14:17:13.710378 kernel: CPU features: detected: GIC system register CPU interface Dec 13 14:17:13.710384 kernel: CPU features: detected: Hardware dirty bit management Dec 13 14:17:13.710390 kernel: CPU features: detected: Spectre-v4 Dec 13 14:17:13.710396 kernel: CPU features: detected: Spectre-BHB Dec 13 14:17:13.710403 kernel: CPU features: kernel page table isolation forced ON by KASLR Dec 13 14:17:13.710409 kernel: CPU features: detected: Kernel page table isolation (KPTI) Dec 13 14:17:13.710415 kernel: CPU features: detected: ARM erratum 1418040 Dec 13 14:17:13.710421 kernel: CPU features: detected: SSBS not fully self-synchronizing Dec 13 14:17:13.710427 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Dec 13 14:17:13.710433 kernel: Policy zone: DMA Dec 13 14:17:13.710440 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:17:13.710447 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:17:13.710453 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:17:13.710459 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:17:13.710465 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:17:13.710473 kernel: Memory: 2457400K/2572288K available (9792K kernel code, 2092K rwdata, 7576K rodata, 36416K init, 777K bss, 114888K reserved, 0K cma-reserved) Dec 13 14:17:13.710479 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 14:17:13.710485 kernel: trace event string verifier disabled Dec 13 14:17:13.710491 kernel: rcu: Preemptible hierarchical RCU implementation. Dec 13 14:17:13.710497 kernel: rcu: RCU event tracing is enabled. Dec 13 14:17:13.710504 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 14:17:13.710510 kernel: Trampoline variant of Tasks RCU enabled. Dec 13 14:17:13.710516 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:17:13.710522 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:17:13.710528 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 14:17:13.710534 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Dec 13 14:17:13.710541 kernel: GICv3: 256 SPIs implemented Dec 13 14:17:13.710547 kernel: GICv3: 0 Extended SPIs implemented Dec 13 14:17:13.710553 kernel: GICv3: Distributor has no Range Selector support Dec 13 14:17:13.710566 kernel: Root IRQ handler: gic_handle_irq Dec 13 14:17:13.710581 kernel: GICv3: 16 PPIs implemented Dec 13 14:17:13.710586 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Dec 13 14:17:13.710592 kernel: ACPI: SRAT not present Dec 13 14:17:13.710598 kernel: ITS [mem 0x08080000-0x0809ffff] Dec 13 14:17:13.710605 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Dec 13 14:17:13.710611 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Dec 13 14:17:13.710617 kernel: GICv3: using LPI property table @0x00000000400d0000 Dec 13 14:17:13.710623 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Dec 13 14:17:13.710631 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 14:17:13.710637 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Dec 13 14:17:13.710643 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Dec 13 14:17:13.710649 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Dec 13 14:17:13.710655 kernel: arm-pv: using stolen time PV Dec 13 14:17:13.710661 kernel: Console: colour dummy device 80x25 Dec 13 14:17:13.710668 kernel: ACPI: Core revision 20210730 Dec 13 14:17:13.710674 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Dec 13 14:17:13.710681 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:17:13.710687 kernel: LSM: Security Framework initializing Dec 13 14:17:13.710694 kernel: SELinux: Initializing. Dec 13 14:17:13.710700 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:17:13.710707 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:17:13.710713 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:17:13.710720 kernel: Platform MSI: ITS@0x8080000 domain created Dec 13 14:17:13.710726 kernel: PCI/MSI: ITS@0x8080000 domain created Dec 13 14:17:13.710732 kernel: Remapping and enabling EFI services. Dec 13 14:17:13.710738 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:17:13.710745 kernel: Detected PIPT I-cache on CPU1 Dec 13 14:17:13.710753 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Dec 13 14:17:13.710759 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Dec 13 14:17:13.710765 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 14:17:13.710772 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Dec 13 14:17:13.710778 kernel: Detected PIPT I-cache on CPU2 Dec 13 14:17:13.710785 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Dec 13 14:17:13.710791 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Dec 13 14:17:13.710797 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 14:17:13.710803 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Dec 13 14:17:13.710809 kernel: Detected PIPT I-cache on CPU3 Dec 13 14:17:13.710817 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Dec 13 14:17:13.710823 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Dec 13 14:17:13.710830 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 14:17:13.710836 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Dec 13 14:17:13.710846 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 14:17:13.710854 kernel: SMP: Total of 4 processors activated. Dec 13 14:17:13.710861 kernel: CPU features: detected: 32-bit EL0 Support Dec 13 14:17:13.710867 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Dec 13 14:17:13.710874 kernel: CPU features: detected: Common not Private translations Dec 13 14:17:13.710880 kernel: CPU features: detected: CRC32 instructions Dec 13 14:17:13.710887 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Dec 13 14:17:13.710893 kernel: CPU features: detected: LSE atomic instructions Dec 13 14:17:13.710902 kernel: CPU features: detected: Privileged Access Never Dec 13 14:17:13.710908 kernel: CPU features: detected: RAS Extension Support Dec 13 14:17:13.710915 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Dec 13 14:17:13.710921 kernel: CPU: All CPU(s) started at EL1 Dec 13 14:17:13.710928 kernel: alternatives: patching kernel code Dec 13 14:17:13.710936 kernel: devtmpfs: initialized Dec 13 14:17:13.710942 kernel: KASLR enabled Dec 13 14:17:13.710949 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:17:13.710955 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 14:17:13.710962 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:17:13.710968 kernel: SMBIOS 3.0.0 present. Dec 13 14:17:13.710981 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Dec 13 14:17:13.710987 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:17:13.710994 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Dec 13 14:17:13.711003 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 13 14:17:13.711009 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 13 14:17:13.711016 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:17:13.711023 kernel: audit: type=2000 audit(0.031:1): state=initialized audit_enabled=0 res=1 Dec 13 14:17:13.711029 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:17:13.711036 kernel: cpuidle: using governor menu Dec 13 14:17:13.711042 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Dec 13 14:17:13.711049 kernel: ASID allocator initialised with 32768 entries Dec 13 14:17:13.711055 kernel: ACPI: bus type PCI registered Dec 13 14:17:13.711063 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:17:13.711070 kernel: Serial: AMBA PL011 UART driver Dec 13 14:17:13.711076 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:17:13.711083 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Dec 13 14:17:13.711089 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:17:13.711096 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Dec 13 14:17:13.711102 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:17:13.711109 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Dec 13 14:17:13.711116 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:17:13.711123 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:17:13.711130 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:17:13.711137 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:17:13.711143 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:17:13.711150 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:17:13.711156 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:17:13.711163 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:17:13.711169 kernel: ACPI: Interpreter enabled Dec 13 14:17:13.711176 kernel: ACPI: Using GIC for interrupt routing Dec 13 14:17:13.711184 kernel: ACPI: MCFG table detected, 1 entries Dec 13 14:17:13.711190 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Dec 13 14:17:13.711197 kernel: printk: console [ttyAMA0] enabled Dec 13 14:17:13.711203 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:17:13.711331 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:17:13.711396 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Dec 13 14:17:13.711454 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Dec 13 14:17:13.711514 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Dec 13 14:17:13.711591 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Dec 13 14:17:13.711600 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Dec 13 14:17:13.711607 kernel: PCI host bridge to bus 0000:00 Dec 13 14:17:13.711671 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Dec 13 14:17:13.711725 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Dec 13 14:17:13.711778 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Dec 13 14:17:13.711830 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:17:13.711902 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Dec 13 14:17:13.711969 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:17:13.712042 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Dec 13 14:17:13.712102 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Dec 13 14:17:13.712162 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Dec 13 14:17:13.712224 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Dec 13 14:17:13.712287 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Dec 13 14:17:13.712347 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Dec 13 14:17:13.712401 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Dec 13 14:17:13.712453 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Dec 13 14:17:13.712506 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Dec 13 14:17:13.712515 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Dec 13 14:17:13.712522 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Dec 13 14:17:13.712529 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Dec 13 14:17:13.712537 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Dec 13 14:17:13.712544 kernel: iommu: Default domain type: Translated Dec 13 14:17:13.712551 kernel: iommu: DMA domain TLB invalidation policy: strict mode Dec 13 14:17:13.712557 kernel: vgaarb: loaded Dec 13 14:17:13.712574 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:17:13.712584 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:17:13.712591 kernel: PTP clock support registered Dec 13 14:17:13.712598 kernel: Registered efivars operations Dec 13 14:17:13.712604 kernel: clocksource: Switched to clocksource arch_sys_counter Dec 13 14:17:13.712613 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:17:13.712620 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:17:13.712626 kernel: pnp: PnP ACPI init Dec 13 14:17:13.712701 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Dec 13 14:17:13.712711 kernel: pnp: PnP ACPI: found 1 devices Dec 13 14:17:13.712718 kernel: NET: Registered PF_INET protocol family Dec 13 14:17:13.712725 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:17:13.712731 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:17:13.712740 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:17:13.712747 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:17:13.712753 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:17:13.712760 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:17:13.712766 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:17:13.712773 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:17:13.712780 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:17:13.712787 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:17:13.712794 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Dec 13 14:17:13.712801 kernel: kvm [1]: HYP mode not available Dec 13 14:17:13.712808 kernel: Initialise system trusted keyrings Dec 13 14:17:13.712815 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:17:13.712821 kernel: Key type asymmetric registered Dec 13 14:17:13.712828 kernel: Asymmetric key parser 'x509' registered Dec 13 14:17:13.712834 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:17:13.712841 kernel: io scheduler mq-deadline registered Dec 13 14:17:13.712848 kernel: io scheduler kyber registered Dec 13 14:17:13.712854 kernel: io scheduler bfq registered Dec 13 14:17:13.712862 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Dec 13 14:17:13.712869 kernel: ACPI: button: Power Button [PWRB] Dec 13 14:17:13.712876 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Dec 13 14:17:13.712936 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Dec 13 14:17:13.712945 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:17:13.712951 kernel: thunder_xcv, ver 1.0 Dec 13 14:17:13.712958 kernel: thunder_bgx, ver 1.0 Dec 13 14:17:13.712964 kernel: nicpf, ver 1.0 Dec 13 14:17:13.712978 kernel: nicvf, ver 1.0 Dec 13 14:17:13.713050 kernel: rtc-efi rtc-efi.0: registered as rtc0 Dec 13 14:17:13.713106 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-12-13T14:17:13 UTC (1734099433) Dec 13 14:17:13.713114 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 14:17:13.713121 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:17:13.713127 kernel: Segment Routing with IPv6 Dec 13 14:17:13.713134 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:17:13.713141 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:17:13.713147 kernel: Key type dns_resolver registered Dec 13 14:17:13.713155 kernel: registered taskstats version 1 Dec 13 14:17:13.713162 kernel: Loading compiled-in X.509 certificates Dec 13 14:17:13.713169 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e011ba9949ade5a6d03f7a5e28171f7f59e70f8a' Dec 13 14:17:13.713175 kernel: Key type .fscrypt registered Dec 13 14:17:13.713182 kernel: Key type fscrypt-provisioning registered Dec 13 14:17:13.713188 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:17:13.713195 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:17:13.713202 kernel: ima: No architecture policies found Dec 13 14:17:13.713208 kernel: clk: Disabling unused clocks Dec 13 14:17:13.713216 kernel: Freeing unused kernel memory: 36416K Dec 13 14:17:13.713223 kernel: Run /init as init process Dec 13 14:17:13.713229 kernel: with arguments: Dec 13 14:17:13.713236 kernel: /init Dec 13 14:17:13.713242 kernel: with environment: Dec 13 14:17:13.713248 kernel: HOME=/ Dec 13 14:17:13.713255 kernel: TERM=linux Dec 13 14:17:13.713261 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:17:13.713270 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:17:13.713280 systemd[1]: Detected virtualization kvm. Dec 13 14:17:13.713287 systemd[1]: Detected architecture arm64. Dec 13 14:17:13.713294 systemd[1]: Running in initrd. Dec 13 14:17:13.713300 systemd[1]: No hostname configured, using default hostname. Dec 13 14:17:13.713307 systemd[1]: Hostname set to . Dec 13 14:17:13.713314 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:17:13.713321 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:17:13.713329 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:17:13.713337 systemd[1]: Reached target cryptsetup.target. Dec 13 14:17:13.713343 systemd[1]: Reached target paths.target. Dec 13 14:17:13.713350 systemd[1]: Reached target slices.target. Dec 13 14:17:13.713357 systemd[1]: Reached target swap.target. Dec 13 14:17:13.713364 systemd[1]: Reached target timers.target. Dec 13 14:17:13.713371 systemd[1]: Listening on iscsid.socket. Dec 13 14:17:13.713379 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:17:13.713386 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:17:13.713393 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:17:13.713400 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:17:13.713407 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:17:13.713414 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:17:13.713421 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:17:13.713428 systemd[1]: Reached target sockets.target. Dec 13 14:17:13.713435 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:17:13.713443 systemd[1]: Finished network-cleanup.service. Dec 13 14:17:13.713450 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:17:13.713457 systemd[1]: Starting systemd-journald.service... Dec 13 14:17:13.713464 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:17:13.713471 systemd[1]: Starting systemd-resolved.service... Dec 13 14:17:13.713477 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:17:13.713484 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:17:13.713491 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:17:13.713498 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:17:13.713506 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:17:13.713514 kernel: audit: type=1130 audit(1734099433.709:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:13.713521 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:17:13.713528 kernel: audit: type=1130 audit(1734099433.712:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:13.713538 systemd-journald[290]: Journal started Dec 13 14:17:13.713600 systemd-journald[290]: Runtime Journal (/run/log/journal/e553bb98a02b418f8984d964668214e9) is 6.0M, max 48.7M, 42.6M free. Dec 13 14:17:13.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:13.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:13.705393 systemd-modules-load[291]: Inserted module 'overlay' Dec 13 14:17:13.716352 systemd[1]: Started systemd-journald.service. Dec 13 14:17:13.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:13.719994 kernel: audit: type=1130 audit(1734099433.716:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:13.719457 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:17:13.726615 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:17:13.730990 systemd-resolved[292]: Positive Trust Anchors: Dec 13 14:17:13.731004 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:17:13.731032 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:17:13.736745 kernel: Bridge firewalling registered Dec 13 14:17:13.733022 systemd-modules-load[291]: Inserted module 'br_netfilter' Dec 13 14:17:13.735552 systemd-resolved[292]: Defaulting to hostname 'linux'. Dec 13 14:17:13.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:13.736349 systemd[1]: Started systemd-resolved.service. Dec 13 14:17:13.740880 kernel: audit: type=1130 audit(1734099433.737:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:13.740423 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:17:13.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:13.743706 systemd[1]: Reached target nss-lookup.target. Dec 13 14:17:13.744751 kernel: audit: type=1130 audit(1734099433.740:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:13.744889 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:17:13.749674 kernel: SCSI subsystem initialized Dec 13 14:17:13.754002 dracut-cmdline[308]: dracut-dracut-053 Dec 13 14:17:13.756029 dracut-cmdline[308]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:17:13.760218 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:17:13.760234 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:17:13.760243 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:17:13.762458 systemd-modules-load[291]: Inserted module 'dm_multipath' Dec 13 14:17:13.763237 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:17:13.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:13.766584 kernel: audit: type=1130 audit(1734099433.763:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:13.766699 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:17:13.772859 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:17:13.775970 kernel: audit: type=1130 audit(1734099433.772:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:13.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:13.817582 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:17:13.828584 kernel: iscsi: registered transport (tcp) Dec 13 14:17:13.843577 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:17:13.843606 kernel: QLogic iSCSI HBA Driver Dec 13 14:17:13.877941 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:17:13.879306 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:17:13.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:13.882588 kernel: audit: type=1130 audit(1734099433.877:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:13.925583 kernel: raid6: neonx8 gen() 13807 MB/s Dec 13 14:17:13.942580 kernel: raid6: neonx8 xor() 10731 MB/s Dec 13 14:17:13.959572 kernel: raid6: neonx4 gen() 13557 MB/s Dec 13 14:17:13.976572 kernel: raid6: neonx4 xor() 11267 MB/s Dec 13 14:17:13.993572 kernel: raid6: neonx2 gen() 12960 MB/s Dec 13 14:17:14.010579 kernel: raid6: neonx2 xor() 10479 MB/s Dec 13 14:17:14.027582 kernel: raid6: neonx1 gen() 10519 MB/s Dec 13 14:17:14.044578 kernel: raid6: neonx1 xor() 8764 MB/s Dec 13 14:17:14.061579 kernel: raid6: int64x8 gen() 6272 MB/s Dec 13 14:17:14.078572 kernel: raid6: int64x8 xor() 3544 MB/s Dec 13 14:17:14.095573 kernel: raid6: int64x4 gen() 7215 MB/s Dec 13 14:17:14.112572 kernel: raid6: int64x4 xor() 3852 MB/s Dec 13 14:17:14.129573 kernel: raid6: int64x2 gen() 6153 MB/s Dec 13 14:17:14.146582 kernel: raid6: int64x2 xor() 3320 MB/s Dec 13 14:17:14.163575 kernel: raid6: int64x1 gen() 5046 MB/s Dec 13 14:17:14.180773 kernel: raid6: int64x1 xor() 2646 MB/s Dec 13 14:17:14.180796 kernel: raid6: using algorithm neonx8 gen() 13807 MB/s Dec 13 14:17:14.180814 kernel: raid6: .... xor() 10731 MB/s, rmw enabled Dec 13 14:17:14.180830 kernel: raid6: using neon recovery algorithm Dec 13 14:17:14.191578 kernel: xor: measuring software checksum speed Dec 13 14:17:14.191590 kernel: 8regs : 16877 MB/sec Dec 13 14:17:14.191599 kernel: 32regs : 19344 MB/sec Dec 13 14:17:14.192883 kernel: arm64_neon : 27349 MB/sec Dec 13 14:17:14.192907 kernel: xor: using function: arm64_neon (27349 MB/sec) Dec 13 14:17:14.246577 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Dec 13 14:17:14.256874 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:17:14.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:14.258379 systemd[1]: Starting systemd-udevd.service... Dec 13 14:17:14.260757 kernel: audit: type=1130 audit(1734099434.256:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:14.257000 audit: BPF prog-id=7 op=LOAD Dec 13 14:17:14.257000 audit: BPF prog-id=8 op=LOAD Dec 13 14:17:14.271320 systemd-udevd[490]: Using default interface naming scheme 'v252'. Dec 13 14:17:14.275574 systemd[1]: Started systemd-udevd.service. Dec 13 14:17:14.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:14.276912 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:17:14.287571 dracut-pre-trigger[494]: rd.md=0: removing MD RAID activation Dec 13 14:17:14.312793 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:17:14.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:14.314004 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:17:14.346543 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:17:14.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:14.374045 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 14:17:14.377860 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:17:14.377875 kernel: GPT:9289727 != 19775487 Dec 13 14:17:14.377883 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:17:14.377892 kernel: GPT:9289727 != 19775487 Dec 13 14:17:14.377900 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:17:14.377908 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:17:14.388955 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:17:14.389737 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:17:14.392853 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (555) Dec 13 14:17:14.396168 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:17:14.401422 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:17:14.405219 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:17:14.406578 systemd[1]: Starting disk-uuid.service... Dec 13 14:17:14.412125 disk-uuid[563]: Primary Header is updated. Dec 13 14:17:14.412125 disk-uuid[563]: Secondary Entries is updated. Dec 13 14:17:14.412125 disk-uuid[563]: Secondary Header is updated. Dec 13 14:17:14.414583 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:17:15.426918 disk-uuid[564]: The operation has completed successfully. Dec 13 14:17:15.429023 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:17:15.458997 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:17:15.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:15.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:15.459093 systemd[1]: Finished disk-uuid.service. Dec 13 14:17:15.460605 systemd[1]: Starting verity-setup.service... Dec 13 14:17:15.474650 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Dec 13 14:17:15.502976 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:17:15.505128 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:17:15.507213 systemd[1]: Finished verity-setup.service. Dec 13 14:17:15.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:15.559584 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:17:15.559663 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:17:15.560390 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:17:15.561159 systemd[1]: Starting ignition-setup.service... Dec 13 14:17:15.562809 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:17:15.573690 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:17:15.573726 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:17:15.573736 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:17:15.581859 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:17:15.589471 systemd[1]: Finished ignition-setup.service. Dec 13 14:17:15.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:15.590864 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:17:15.642387 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:17:15.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:15.643000 audit: BPF prog-id=9 op=LOAD Dec 13 14:17:15.644318 systemd[1]: Starting systemd-networkd.service... Dec 13 14:17:15.672367 systemd-networkd[735]: lo: Link UP Dec 13 14:17:15.672382 systemd-networkd[735]: lo: Gained carrier Dec 13 14:17:15.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:15.672772 systemd-networkd[735]: Enumeration completed Dec 13 14:17:15.672866 systemd[1]: Started systemd-networkd.service. Dec 13 14:17:15.672946 systemd-networkd[735]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:17:15.673741 systemd[1]: Reached target network.target. Dec 13 14:17:15.674328 systemd-networkd[735]: eth0: Link UP Dec 13 14:17:15.674332 systemd-networkd[735]: eth0: Gained carrier Dec 13 14:17:15.677084 systemd[1]: Starting iscsiuio.service... Dec 13 14:17:15.689128 systemd[1]: Started iscsiuio.service. Dec 13 14:17:15.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:15.690582 systemd[1]: Starting iscsid.service... Dec 13 14:17:15.694310 iscsid[745]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:17:15.694310 iscsid[745]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:17:15.694310 iscsid[745]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:17:15.694310 iscsid[745]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:17:15.694310 iscsid[745]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:17:15.694310 iscsid[745]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:17:15.700632 systemd-networkd[735]: eth0: DHCPv4 address 10.0.0.118/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 14:17:15.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:15.700658 systemd[1]: Started iscsid.service. Dec 13 14:17:15.703716 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:17:15.714172 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:17:15.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:15.714958 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:17:15.716141 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:17:15.717426 systemd[1]: Reached target remote-fs.target. Dec 13 14:17:15.717766 ignition[663]: Ignition 2.14.0 Dec 13 14:17:15.719408 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:17:15.717773 ignition[663]: Stage: fetch-offline Dec 13 14:17:15.717811 ignition[663]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:17:15.717819 ignition[663]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:17:15.717954 ignition[663]: parsed url from cmdline: "" Dec 13 14:17:15.717957 ignition[663]: no config URL provided Dec 13 14:17:15.717962 ignition[663]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:17:15.717979 ignition[663]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:17:15.717997 ignition[663]: op(1): [started] loading QEMU firmware config module Dec 13 14:17:15.718002 ignition[663]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 14:17:15.725069 ignition[663]: op(1): [finished] loading QEMU firmware config module Dec 13 14:17:15.727066 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:17:15.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:15.764342 ignition[663]: parsing config with SHA512: d9f85f52a2c425410ca88fb4a2e5e2b3b2ff45b0c994af802ad5146e8d91dee393d3bcbce61f684507fbc8ecdd0d0cef5f5d6de42ce740e4401bdae5464e9864 Dec 13 14:17:15.776488 unknown[663]: fetched base config from "system" Dec 13 14:17:15.776501 unknown[663]: fetched user config from "qemu" Dec 13 14:17:15.777025 ignition[663]: fetch-offline: fetch-offline passed Dec 13 14:17:15.777081 ignition[663]: Ignition finished successfully Dec 13 14:17:15.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:15.777982 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:17:15.778988 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 14:17:15.779701 systemd[1]: Starting ignition-kargs.service... Dec 13 14:17:15.787875 ignition[761]: Ignition 2.14.0 Dec 13 14:17:15.787883 ignition[761]: Stage: kargs Dec 13 14:17:15.787974 ignition[761]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:17:15.787985 ignition[761]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:17:15.789867 systemd[1]: Finished ignition-kargs.service. Dec 13 14:17:15.788784 ignition[761]: kargs: kargs passed Dec 13 14:17:15.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:15.791617 systemd[1]: Starting ignition-disks.service... Dec 13 14:17:15.788824 ignition[761]: Ignition finished successfully Dec 13 14:17:15.797876 ignition[767]: Ignition 2.14.0 Dec 13 14:17:15.797886 ignition[767]: Stage: disks Dec 13 14:17:15.797985 ignition[767]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:17:15.797995 ignition[767]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:17:15.799670 systemd[1]: Finished ignition-disks.service. Dec 13 14:17:15.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:15.798842 ignition[767]: disks: disks passed Dec 13 14:17:15.800912 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:17:15.798881 ignition[767]: Ignition finished successfully Dec 13 14:17:15.801878 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:17:15.802790 systemd[1]: Reached target local-fs.target. Dec 13 14:17:15.803803 systemd[1]: Reached target sysinit.target. Dec 13 14:17:15.804837 systemd[1]: Reached target basic.target. Dec 13 14:17:15.806530 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:17:15.816845 systemd-fsck[775]: ROOT: clean, 621/553520 files, 56020/553472 blocks Dec 13 14:17:15.820318 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:17:15.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:15.821781 systemd[1]: Mounting sysroot.mount... Dec 13 14:17:15.826583 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:17:15.826947 systemd[1]: Mounted sysroot.mount. Dec 13 14:17:15.827632 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:17:15.829816 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:17:15.830529 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:17:15.830594 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:17:15.830619 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:17:15.832367 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:17:15.834665 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:17:15.838930 initrd-setup-root[785]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:17:15.843278 initrd-setup-root[793]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:17:15.847164 initrd-setup-root[801]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:17:15.851094 initrd-setup-root[809]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:17:15.876249 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:17:15.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:15.877618 systemd[1]: Starting ignition-mount.service... Dec 13 14:17:15.878774 systemd[1]: Starting sysroot-boot.service... Dec 13 14:17:15.883600 bash[826]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 14:17:15.892518 ignition[828]: INFO : Ignition 2.14.0 Dec 13 14:17:15.892518 ignition[828]: INFO : Stage: mount Dec 13 14:17:15.893763 ignition[828]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:17:15.893763 ignition[828]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:17:15.893763 ignition[828]: INFO : mount: mount passed Dec 13 14:17:15.893763 ignition[828]: INFO : Ignition finished successfully Dec 13 14:17:15.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:15.895145 systemd[1]: Finished ignition-mount.service. Dec 13 14:17:15.898797 systemd[1]: Finished sysroot-boot.service. Dec 13 14:17:15.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:16.517216 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:17:16.522580 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (837) Dec 13 14:17:16.523961 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:17:16.523989 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:17:16.523998 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:17:16.527229 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:17:16.528612 systemd[1]: Starting ignition-files.service... Dec 13 14:17:16.541940 ignition[857]: INFO : Ignition 2.14.0 Dec 13 14:17:16.541940 ignition[857]: INFO : Stage: files Dec 13 14:17:16.543103 ignition[857]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:17:16.543103 ignition[857]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:17:16.543103 ignition[857]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:17:16.547297 ignition[857]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:17:16.547297 ignition[857]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:17:16.549637 ignition[857]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:17:16.549637 ignition[857]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:17:16.551645 unknown[857]: wrote ssh authorized keys file for user: core Dec 13 14:17:16.552536 ignition[857]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:17:16.552536 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Dec 13 14:17:16.552536 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Dec 13 14:17:16.792231 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 14:17:16.810807 systemd-networkd[735]: eth0: Gained IPv6LL Dec 13 14:17:16.923397 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Dec 13 14:17:16.925490 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:17:16.925490 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:17:16.925490 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:17:16.925490 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:17:16.925490 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:17:16.925490 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:17:16.925490 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:17:16.925490 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:17:16.925490 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:17:16.925490 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:17:16.925490 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Dec 13 14:17:16.925490 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Dec 13 14:17:16.925490 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Dec 13 14:17:16.925490 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-arm64.raw: attempt #1 Dec 13 14:17:17.263099 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 14:17:17.800223 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Dec 13 14:17:17.800223 ignition[857]: INFO : files: op(b): [started] processing unit "prepare-helm.service" Dec 13 14:17:17.803380 ignition[857]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:17:17.803380 ignition[857]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:17:17.803380 ignition[857]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" Dec 13 14:17:17.803380 ignition[857]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Dec 13 14:17:17.803380 ignition[857]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:17:17.803380 ignition[857]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:17:17.803380 ignition[857]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Dec 13 14:17:17.803380 ignition[857]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:17:17.803380 ignition[857]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:17:17.803380 ignition[857]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 14:17:17.803380 ignition[857]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:17:17.840166 ignition[857]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:17:17.842220 ignition[857]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 14:17:17.842220 ignition[857]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:17:17.842220 ignition[857]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:17:17.842220 ignition[857]: INFO : files: files passed Dec 13 14:17:17.842220 ignition[857]: INFO : Ignition finished successfully Dec 13 14:17:17.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.842388 systemd[1]: Finished ignition-files.service. Dec 13 14:17:17.844719 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:17:17.845520 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:17:17.851207 initrd-setup-root-after-ignition[882]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 14:17:17.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.846208 systemd[1]: Starting ignition-quench.service... Dec 13 14:17:17.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.853870 initrd-setup-root-after-ignition[885]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:17:17.849873 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:17:17.849957 systemd[1]: Finished ignition-quench.service. Dec 13 14:17:17.851951 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:17:17.853439 systemd[1]: Reached target ignition-complete.target. Dec 13 14:17:17.854979 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:17:17.866364 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:17:17.866453 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:17:17.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.867713 systemd[1]: Reached target initrd-fs.target. Dec 13 14:17:17.868558 systemd[1]: Reached target initrd.target. Dec 13 14:17:17.869544 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:17:17.870240 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:17:17.880031 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:17:17.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.881325 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:17:17.888842 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:17:17.889518 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:17:17.890235 systemd[1]: Stopped target timers.target. Dec 13 14:17:17.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.891265 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:17:17.891365 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:17:17.892378 systemd[1]: Stopped target initrd.target. Dec 13 14:17:17.893186 systemd[1]: Stopped target basic.target. Dec 13 14:17:17.894277 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:17:17.895289 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:17:17.896291 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:17:17.897259 systemd[1]: Stopped target remote-fs.target. Dec 13 14:17:17.898337 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:17:17.899397 systemd[1]: Stopped target sysinit.target. Dec 13 14:17:17.900421 systemd[1]: Stopped target local-fs.target. Dec 13 14:17:17.901346 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:17:17.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.902327 systemd[1]: Stopped target swap.target. Dec 13 14:17:17.903212 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:17:17.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.903309 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:17:17.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.904260 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:17:17.905168 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:17:17.905258 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:17:17.906173 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:17:17.906259 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:17:17.907330 systemd[1]: Stopped target paths.target. Dec 13 14:17:17.908190 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:17:17.913589 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:17:17.914291 systemd[1]: Stopped target slices.target. Dec 13 14:17:17.915355 systemd[1]: Stopped target sockets.target. Dec 13 14:17:17.916267 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:17:17.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.916366 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:17:17.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.917344 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:17:17.917436 systemd[1]: Stopped ignition-files.service. Dec 13 14:17:17.922302 iscsid[745]: iscsid shutting down. Dec 13 14:17:17.919297 systemd[1]: Stopping ignition-mount.service... Dec 13 14:17:17.920391 systemd[1]: Stopping iscsid.service... Dec 13 14:17:17.923943 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:17:17.924817 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:17:17.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.926492 ignition[898]: INFO : Ignition 2.14.0 Dec 13 14:17:17.926492 ignition[898]: INFO : Stage: umount Dec 13 14:17:17.926492 ignition[898]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:17:17.926492 ignition[898]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:17:17.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.924945 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:17:17.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.932005 ignition[898]: INFO : umount: umount passed Dec 13 14:17:17.932005 ignition[898]: INFO : Ignition finished successfully Dec 13 14:17:17.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.925903 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:17:17.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.926000 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:17:17.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.929147 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:17:17.929236 systemd[1]: Stopped iscsid.service. Dec 13 14:17:17.930288 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:17:17.930362 systemd[1]: Stopped ignition-mount.service. Dec 13 14:17:17.931739 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:17:17.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.931807 systemd[1]: Closed iscsid.socket. Dec 13 14:17:17.932481 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:17:17.932519 systemd[1]: Stopped ignition-disks.service. Dec 13 14:17:17.934254 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:17:17.934295 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:17:17.935603 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:17:17.935643 systemd[1]: Stopped ignition-setup.service. Dec 13 14:17:17.937320 systemd[1]: Stopping iscsiuio.service... Dec 13 14:17:17.940218 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:17:17.940656 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:17:17.940746 systemd[1]: Stopped iscsiuio.service. Dec 13 14:17:17.942104 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:17:17.942178 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:17:17.943736 systemd[1]: Stopped target network.target. Dec 13 14:17:17.944641 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:17:17.944674 systemd[1]: Closed iscsiuio.socket. Dec 13 14:17:17.945768 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:17:17.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.946985 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:17:17.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.953655 systemd-networkd[735]: eth0: DHCPv6 lease lost Dec 13 14:17:17.955150 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:17:17.955244 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:17:17.957705 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:17:17.963000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:17:17.963000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:17:17.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.957791 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:17:17.958806 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:17:17.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.958834 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:17:17.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.960924 systemd[1]: Stopping network-cleanup.service... Dec 13 14:17:17.961964 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:17:17.962024 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:17:17.963399 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:17:17.963439 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:17:17.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.965793 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:17:17.965834 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:17:17.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.967364 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:17:17.971734 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:17:17.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.972225 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:17:17.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.972304 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:17:17.973912 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:17:17.973974 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:17:17.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.976001 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:17:17.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.976084 systemd[1]: Stopped network-cleanup.service. Dec 13 14:17:17.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.978393 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:17:17.978509 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:17:17.979720 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:17:17.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.979755 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:17:17.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.980724 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:17:17.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.980755 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:17:17.981636 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:17:17.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:17.981673 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:17:17.982817 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:17:17.982853 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:17:17.983856 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:17:17.983895 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:17:17.985706 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:17:17.986811 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:17:17.986862 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:17:17.988544 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:17:17.988619 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:17:17.989252 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:17:17.989288 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:17:17.991020 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:17:17.991411 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:17:17.991489 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:17:17.992300 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:17:17.993996 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:17:17.999955 systemd[1]: Switching root. Dec 13 14:17:18.017809 systemd-journald[290]: Journal stopped Dec 13 14:17:19.993916 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). Dec 13 14:17:19.993982 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:17:19.993997 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:17:19.994008 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:17:19.994018 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:17:19.994028 kernel: SELinux: policy capability open_perms=1 Dec 13 14:17:19.994038 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:17:19.994047 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:17:19.994056 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:17:19.994066 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:17:19.994076 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:17:19.994087 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:17:19.994100 kernel: kauditd_printk_skb: 65 callbacks suppressed Dec 13 14:17:19.994110 kernel: audit: type=1403 audit(1734099438.080:76): auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:17:19.994121 systemd[1]: Successfully loaded SELinux policy in 37.220ms. Dec 13 14:17:19.994140 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.740ms. Dec 13 14:17:19.994153 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:17:19.994164 systemd[1]: Detected virtualization kvm. Dec 13 14:17:19.994176 systemd[1]: Detected architecture arm64. Dec 13 14:17:19.994186 systemd[1]: Detected first boot. Dec 13 14:17:19.994197 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:17:19.994208 kernel: audit: type=1400 audit(1734099438.164:77): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:17:19.994218 kernel: audit: type=1400 audit(1734099438.164:78): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:17:19.994228 kernel: audit: type=1334 audit(1734099438.166:79): prog-id=10 op=LOAD Dec 13 14:17:19.994238 kernel: audit: type=1334 audit(1734099438.166:80): prog-id=10 op=UNLOAD Dec 13 14:17:19.994248 kernel: audit: type=1334 audit(1734099438.168:81): prog-id=11 op=LOAD Dec 13 14:17:19.994258 kernel: audit: type=1334 audit(1734099438.168:82): prog-id=11 op=UNLOAD Dec 13 14:17:19.994269 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:17:19.994280 kernel: audit: type=1400 audit(1734099438.209:83): avc: denied { associate } for pid=931 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:17:19.994290 kernel: audit: type=1300 audit(1734099438.209:83): arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c58ac a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=914 pid=931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.994301 kernel: audit: type=1327 audit(1734099438.209:83): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:17:19.994313 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:17:19.994325 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:17:19.994337 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:17:19.994349 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:17:19.994360 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:17:19.994371 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:17:19.994381 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:17:19.994395 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:17:19.994407 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:17:19.994422 systemd[1]: Created slice system-getty.slice. Dec 13 14:17:19.994432 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:17:19.994443 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:17:19.994453 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:17:19.994464 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:17:19.994474 systemd[1]: Created slice user.slice. Dec 13 14:17:19.994485 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:17:19.994496 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:17:19.994508 systemd[1]: Set up automount boot.automount. Dec 13 14:17:19.994518 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:17:19.994529 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:17:19.994540 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:17:19.994550 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:17:19.994570 systemd[1]: Reached target integritysetup.target. Dec 13 14:17:19.994581 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:17:19.994591 systemd[1]: Reached target remote-fs.target. Dec 13 14:17:19.994604 systemd[1]: Reached target slices.target. Dec 13 14:17:19.994614 systemd[1]: Reached target swap.target. Dec 13 14:17:19.994625 systemd[1]: Reached target torcx.target. Dec 13 14:17:19.994635 systemd[1]: Reached target veritysetup.target. Dec 13 14:17:19.994646 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:17:19.994656 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:17:19.994667 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:17:19.994677 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:17:19.994688 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:17:19.994699 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:17:19.994711 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:17:19.994722 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:17:19.994733 systemd[1]: Mounting media.mount... Dec 13 14:17:19.994743 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:17:19.994753 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:17:19.994764 systemd[1]: Mounting tmp.mount... Dec 13 14:17:19.994774 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:17:19.994785 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:17:19.994797 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:17:19.994808 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:17:19.994818 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:17:19.994829 systemd[1]: Starting modprobe@drm.service... Dec 13 14:17:19.994839 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:17:19.994850 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:17:19.994860 systemd[1]: Starting modprobe@loop.service... Dec 13 14:17:19.994871 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:17:19.994882 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:17:19.994893 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:17:19.994904 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:17:19.994914 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:17:19.994925 systemd[1]: Stopped systemd-journald.service. Dec 13 14:17:19.994935 kernel: fuse: init (API version 7.34) Dec 13 14:17:19.994945 systemd[1]: Starting systemd-journald.service... Dec 13 14:17:19.994960 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:17:19.994971 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:17:19.994982 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:17:19.994992 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:17:19.995004 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:17:19.995015 systemd[1]: Stopped verity-setup.service. Dec 13 14:17:19.995025 kernel: loop: module loaded Dec 13 14:17:19.995035 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:17:19.995045 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:17:19.995056 systemd[1]: Mounted media.mount. Dec 13 14:17:19.995067 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:17:19.995077 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:17:19.995088 systemd[1]: Mounted tmp.mount. Dec 13 14:17:19.995100 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:17:19.995111 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:17:19.995121 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:17:19.995131 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:17:19.995141 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:17:19.995152 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:17:19.995162 systemd[1]: Finished modprobe@drm.service. Dec 13 14:17:19.995174 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:17:19.995184 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:17:19.995195 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:17:19.995205 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:17:19.995215 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:17:19.995226 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:17:19.995236 systemd[1]: Finished modprobe@loop.service. Dec 13 14:17:19.995249 systemd-journald[994]: Journal started Dec 13 14:17:19.995287 systemd-journald[994]: Runtime Journal (/run/log/journal/e553bb98a02b418f8984d964668214e9) is 6.0M, max 48.7M, 42.6M free. Dec 13 14:17:18.080000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:17:18.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:17:18.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:17:18.166000 audit: BPF prog-id=10 op=LOAD Dec 13 14:17:18.166000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:17:18.168000 audit: BPF prog-id=11 op=LOAD Dec 13 14:17:18.168000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:17:18.209000 audit[931]: AVC avc: denied { associate } for pid=931 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:17:18.209000 audit[931]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c58ac a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=914 pid=931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:18.209000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:17:18.210000 audit[931]: AVC avc: denied { associate } for pid=931 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:17:18.210000 audit[931]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5985 a2=1ed a3=0 items=2 ppid=914 pid=931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:18.210000 audit: CWD cwd="/" Dec 13 14:17:18.210000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:18.210000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:17:18.210000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:17:19.868000 audit: BPF prog-id=12 op=LOAD Dec 13 14:17:19.868000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:17:19.868000 audit: BPF prog-id=13 op=LOAD Dec 13 14:17:19.868000 audit: BPF prog-id=14 op=LOAD Dec 13 14:17:19.868000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:17:19.868000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:17:19.869000 audit: BPF prog-id=15 op=LOAD Dec 13 14:17:19.869000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:17:19.869000 audit: BPF prog-id=16 op=LOAD Dec 13 14:17:19.869000 audit: BPF prog-id=17 op=LOAD Dec 13 14:17:19.869000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:17:19.869000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:17:19.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.878000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:17:19.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.954000 audit: BPF prog-id=18 op=LOAD Dec 13 14:17:19.954000 audit: BPF prog-id=19 op=LOAD Dec 13 14:17:19.954000 audit: BPF prog-id=20 op=LOAD Dec 13 14:17:19.954000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:17:19.954000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:17:19.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.990000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:17:19.990000 audit[994]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffed014400 a2=4000 a3=1 items=0 ppid=1 pid=994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.990000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:17:19.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.867598 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:17:18.208297 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:17:19.867609 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 14:17:19.996855 systemd[1]: Started systemd-journald.service. Dec 13 14:17:18.208549 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:17:19.870603 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:17:19.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:18.208587 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:17:18.208619 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:18Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:17:18.208628 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:18Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:17:18.208656 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:18Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:17:18.208667 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:18Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:17:19.997270 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:17:18.208855 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:18Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:17:18.208888 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:17:18.208899 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:17:18.209313 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:17:18.209346 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:17:18.209363 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:17:18.209376 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:17:18.209392 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:17:19.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:18.209405 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:17:19.628878 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:19Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:17:19.629151 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:19Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:17:19.629251 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:19Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:17:19.629411 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:19Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:17:19.629459 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:19Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:17:19.629512 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-12-13T14:17:19Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:17:19.998488 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:17:19.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:19.999479 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:17:20.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.000691 systemd[1]: Reached target network-pre.target. Dec 13 14:17:20.002397 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:17:20.004267 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:17:20.004859 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:17:20.006343 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:17:20.008113 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:17:20.008910 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:17:20.009948 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:17:20.010668 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:17:20.011729 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:17:20.013693 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:17:20.017041 systemd-journald[994]: Time spent on flushing to /var/log/journal/e553bb98a02b418f8984d964668214e9 is 18.964ms for 997 entries. Dec 13 14:17:20.017041 systemd-journald[994]: System Journal (/var/log/journal/e553bb98a02b418f8984d964668214e9) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:17:20.045194 systemd-journald[994]: Received client request to flush runtime journal. Dec 13 14:17:20.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.016965 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:17:20.018531 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:17:20.046484 udevadm[1032]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 14:17:20.019520 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:17:20.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.021451 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:17:20.026865 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:17:20.029425 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:17:20.031665 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:17:20.033377 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:17:20.035671 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:17:20.046164 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:17:20.050930 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:17:20.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.369600 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:17:20.370000 audit: BPF prog-id=21 op=LOAD Dec 13 14:17:20.370000 audit: BPF prog-id=22 op=LOAD Dec 13 14:17:20.370000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:17:20.370000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:17:20.372063 systemd[1]: Starting systemd-udevd.service... Dec 13 14:17:20.396301 systemd-udevd[1037]: Using default interface naming scheme 'v252'. Dec 13 14:17:20.407418 systemd[1]: Started systemd-udevd.service. Dec 13 14:17:20.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.414000 audit: BPF prog-id=23 op=LOAD Dec 13 14:17:20.421000 audit: BPF prog-id=24 op=LOAD Dec 13 14:17:20.421000 audit: BPF prog-id=25 op=LOAD Dec 13 14:17:20.421000 audit: BPF prog-id=26 op=LOAD Dec 13 14:17:20.419608 systemd[1]: Starting systemd-networkd.service... Dec 13 14:17:20.423150 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:17:20.439863 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Dec 13 14:17:20.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.456867 systemd[1]: Started systemd-userdbd.service. Dec 13 14:17:20.471921 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:17:20.512204 systemd-networkd[1057]: lo: Link UP Dec 13 14:17:20.512214 systemd-networkd[1057]: lo: Gained carrier Dec 13 14:17:20.512556 systemd-networkd[1057]: Enumeration completed Dec 13 14:17:20.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.512676 systemd[1]: Started systemd-networkd.service. Dec 13 14:17:20.512965 systemd-networkd[1057]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:17:20.515981 systemd-networkd[1057]: eth0: Link UP Dec 13 14:17:20.515993 systemd-networkd[1057]: eth0: Gained carrier Dec 13 14:17:20.521015 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:17:20.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.522784 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:17:20.528681 systemd-networkd[1057]: eth0: DHCPv4 address 10.0.0.118/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 14:17:20.541776 lvm[1070]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:17:20.572326 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:17:20.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.573137 systemd[1]: Reached target cryptsetup.target. Dec 13 14:17:20.574761 systemd[1]: Starting lvm2-activation.service... Dec 13 14:17:20.578323 lvm[1071]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:17:20.614333 systemd[1]: Finished lvm2-activation.service. Dec 13 14:17:20.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.615067 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:17:20.615682 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:17:20.615709 systemd[1]: Reached target local-fs.target. Dec 13 14:17:20.616286 systemd[1]: Reached target machines.target. Dec 13 14:17:20.617906 systemd[1]: Starting ldconfig.service... Dec 13 14:17:20.618753 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:17:20.618800 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:17:20.619795 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:17:20.621498 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:17:20.623393 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:17:20.625730 systemd[1]: Starting systemd-sysext.service... Dec 13 14:17:20.626638 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1073 (bootctl) Dec 13 14:17:20.628056 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:17:20.630097 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:17:20.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.644460 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:17:20.648688 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:17:20.648865 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:17:20.689583 kernel: loop0: detected capacity change from 0 to 189592 Dec 13 14:17:20.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.690066 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:17:20.702992 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:17:20.708786 systemd-fsck[1083]: fsck.fat 4.2 (2021-01-31) Dec 13 14:17:20.708786 systemd-fsck[1083]: /dev/vda1: 236 files, 117175/258078 clusters Dec 13 14:17:20.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.712912 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:17:20.719592 kernel: loop1: detected capacity change from 0 to 189592 Dec 13 14:17:20.723868 (sd-sysext)[1088]: Using extensions 'kubernetes'. Dec 13 14:17:20.724218 (sd-sysext)[1088]: Merged extensions into '/usr'. Dec 13 14:17:20.747147 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:17:20.748498 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:17:20.750546 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:17:20.752650 systemd[1]: Starting modprobe@loop.service... Dec 13 14:17:20.753542 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:17:20.753749 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:17:20.754485 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:17:20.754615 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:17:20.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.755992 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:17:20.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.756093 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:17:20.757280 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:17:20.757387 systemd[1]: Finished modprobe@loop.service. Dec 13 14:17:20.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.758512 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:17:20.758708 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:17:20.787858 ldconfig[1072]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:17:20.791647 systemd[1]: Finished ldconfig.service. Dec 13 14:17:20.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.970323 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:17:20.972190 systemd[1]: Mounting boot.mount... Dec 13 14:17:20.973920 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:17:20.980182 systemd[1]: Mounted boot.mount. Dec 13 14:17:20.981138 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:17:20.982873 systemd[1]: Finished systemd-sysext.service. Dec 13 14:17:20.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.984686 systemd[1]: Starting ensure-sysext.service... Dec 13 14:17:20.986453 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:17:20.987552 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:17:20.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:20.991127 systemd[1]: Reloading. Dec 13 14:17:20.995480 systemd-tmpfiles[1096]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:17:20.996188 systemd-tmpfiles[1096]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:17:20.997468 systemd-tmpfiles[1096]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:17:21.023270 /usr/lib/systemd/system-generators/torcx-generator[1116]: time="2024-12-13T14:17:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:17:21.023304 /usr/lib/systemd/system-generators/torcx-generator[1116]: time="2024-12-13T14:17:21Z" level=info msg="torcx already run" Dec 13 14:17:21.084311 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:17:21.084331 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:17:21.099586 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:17:21.140000 audit: BPF prog-id=27 op=LOAD Dec 13 14:17:21.140000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:17:21.140000 audit: BPF prog-id=28 op=LOAD Dec 13 14:17:21.140000 audit: BPF prog-id=29 op=LOAD Dec 13 14:17:21.140000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:17:21.140000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:17:21.141000 audit: BPF prog-id=30 op=LOAD Dec 13 14:17:21.141000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:17:21.141000 audit: BPF prog-id=31 op=LOAD Dec 13 14:17:21.141000 audit: BPF prog-id=32 op=LOAD Dec 13 14:17:21.141000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:17:21.141000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:17:21.142000 audit: BPF prog-id=33 op=LOAD Dec 13 14:17:21.142000 audit: BPF prog-id=34 op=LOAD Dec 13 14:17:21.142000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:17:21.142000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:17:21.143000 audit: BPF prog-id=35 op=LOAD Dec 13 14:17:21.143000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:17:21.146168 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:17:21.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.150443 systemd[1]: Starting audit-rules.service... Dec 13 14:17:21.152191 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:17:21.155000 audit: BPF prog-id=36 op=LOAD Dec 13 14:17:21.154122 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:17:21.156444 systemd[1]: Starting systemd-resolved.service... Dec 13 14:17:21.157000 audit: BPF prog-id=37 op=LOAD Dec 13 14:17:21.158920 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:17:21.161905 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:17:21.163148 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:17:21.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.166142 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:17:21.167793 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:17:21.168987 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:17:21.168000 audit[1166]: SYSTEM_BOOT pid=1166 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.170918 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:17:21.172920 systemd[1]: Starting modprobe@loop.service... Dec 13 14:17:21.173585 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:17:21.173711 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:17:21.173816 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:17:21.174640 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:17:21.174753 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:17:21.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.175809 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:17:21.175916 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:17:21.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.177017 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:17:21.177125 systemd[1]: Finished modprobe@loop.service. Dec 13 14:17:21.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.179780 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:17:21.179933 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:17:21.182043 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:17:21.183258 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:17:21.185100 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:17:21.186901 systemd[1]: Starting modprobe@loop.service... Dec 13 14:17:21.187522 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:17:21.187652 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:17:21.187752 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:17:21.188613 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:17:21.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.189788 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:17:21.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.190867 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:17:21.190991 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:17:21.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.192185 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:17:21.192296 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:17:21.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.193453 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:17:21.193572 systemd[1]: Finished modprobe@loop.service. Dec 13 14:17:21.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.197156 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:17:21.199887 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:17:21.201525 systemd[1]: Starting modprobe@drm.service... Dec 13 14:17:21.203631 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:17:21.205324 systemd[1]: Starting modprobe@loop.service... Dec 13 14:17:21.205986 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:17:21.206107 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:17:21.207367 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:17:21.209394 systemd[1]: Starting systemd-update-done.service... Dec 13 14:17:21.210127 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:17:21.211222 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:17:21.211338 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:17:21.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.212402 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:17:21.212509 systemd[1]: Finished modprobe@drm.service. Dec 13 14:17:21.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:21.212000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:17:21.212000 audit[1182]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffe50ff10 a2=420 a3=0 items=0 ppid=1155 pid=1182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:21.212000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:17:21.213520 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:17:21.214030 augenrules[1182]: No rules Dec 13 14:17:21.213711 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:17:21.214769 systemd[1]: Finished audit-rules.service. Dec 13 14:17:21.215723 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:17:21.215838 systemd[1]: Finished modprobe@loop.service. Dec 13 14:17:21.217062 systemd[1]: Finished systemd-update-done.service. Dec 13 14:17:21.218147 systemd[1]: Finished ensure-sysext.service. Dec 13 14:17:21.219767 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:17:21.219813 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:17:21.222216 systemd-resolved[1161]: Positive Trust Anchors: Dec 13 14:17:21.222226 systemd-resolved[1161]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:17:21.222252 systemd-resolved[1161]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:17:21.228347 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:17:20.813593 systemd-timesyncd[1165]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 14:17:20.831039 systemd-journald[994]: Time jumped backwards, rotating. Dec 13 14:17:20.813650 systemd-timesyncd[1165]: Initial clock synchronization to Fri 2024-12-13 14:17:20.813519 UTC. Dec 13 14:17:20.813897 systemd[1]: Reached target time-set.target. Dec 13 14:17:20.816755 systemd-resolved[1161]: Defaulting to hostname 'linux'. Dec 13 14:17:20.818034 systemd[1]: Started systemd-resolved.service. Dec 13 14:17:20.818774 systemd[1]: Reached target network.target. Dec 13 14:17:20.819369 systemd[1]: Reached target nss-lookup.target. Dec 13 14:17:20.819932 systemd[1]: Reached target sysinit.target. Dec 13 14:17:20.820563 systemd[1]: Started motdgen.path. Dec 13 14:17:20.821082 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:17:20.823367 systemd[1]: Started logrotate.timer. Dec 13 14:17:20.824004 systemd[1]: Started mdadm.timer. Dec 13 14:17:20.824560 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:17:20.825180 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:17:20.825203 systemd[1]: Reached target paths.target. Dec 13 14:17:20.825916 systemd[1]: Reached target timers.target. Dec 13 14:17:20.826852 systemd[1]: Listening on dbus.socket. Dec 13 14:17:20.828402 systemd[1]: Starting docker.socket... Dec 13 14:17:20.831550 systemd[1]: Listening on sshd.socket. Dec 13 14:17:20.832215 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:17:20.832652 systemd[1]: Listening on docker.socket. Dec 13 14:17:20.833319 systemd[1]: Reached target sockets.target. Dec 13 14:17:20.833883 systemd[1]: Reached target basic.target. Dec 13 14:17:20.834475 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:17:20.834506 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:17:20.835658 systemd[1]: Starting containerd.service... Dec 13 14:17:20.837241 systemd[1]: Starting dbus.service... Dec 13 14:17:20.838752 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:17:20.840440 systemd[1]: Starting extend-filesystems.service... Dec 13 14:17:20.841162 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:17:20.842501 systemd[1]: Starting motdgen.service... Dec 13 14:17:20.844946 systemd[1]: Starting prepare-helm.service... Dec 13 14:17:20.847921 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:17:20.849934 systemd[1]: Starting sshd-keygen.service... Dec 13 14:17:20.852552 systemd[1]: Starting systemd-logind.service... Dec 13 14:17:20.855224 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:17:20.855291 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:17:20.855672 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:17:20.856314 systemd[1]: Starting update-engine.service... Dec 13 14:17:20.857182 jq[1199]: false Dec 13 14:17:20.857885 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:17:20.860171 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:17:20.860334 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:17:20.861189 jq[1217]: true Dec 13 14:17:20.861460 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:17:20.861637 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:17:20.868433 extend-filesystems[1200]: Found loop1 Dec 13 14:17:20.868433 extend-filesystems[1200]: Found vda Dec 13 14:17:20.868433 extend-filesystems[1200]: Found vda1 Dec 13 14:17:20.868433 extend-filesystems[1200]: Found vda2 Dec 13 14:17:20.868433 extend-filesystems[1200]: Found vda3 Dec 13 14:17:20.868433 extend-filesystems[1200]: Found usr Dec 13 14:17:20.868433 extend-filesystems[1200]: Found vda4 Dec 13 14:17:20.868433 extend-filesystems[1200]: Found vda6 Dec 13 14:17:20.868433 extend-filesystems[1200]: Found vda7 Dec 13 14:17:20.868433 extend-filesystems[1200]: Found vda9 Dec 13 14:17:20.868433 extend-filesystems[1200]: Checking size of /dev/vda9 Dec 13 14:17:20.891559 tar[1219]: linux-arm64/helm Dec 13 14:17:20.891756 jq[1221]: true Dec 13 14:17:20.871561 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:17:20.871711 systemd[1]: Finished motdgen.service. Dec 13 14:17:20.897401 extend-filesystems[1200]: Resized partition /dev/vda9 Dec 13 14:17:20.915198 extend-filesystems[1234]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:17:20.928389 dbus-daemon[1198]: [system] SELinux support is enabled Dec 13 14:17:20.928569 systemd[1]: Started dbus.service. Dec 13 14:17:20.930916 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:17:20.930946 systemd[1]: Reached target system-config.target. Dec 13 14:17:20.931652 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:17:20.931670 systemd[1]: Reached target user-config.target. Dec 13 14:17:20.943779 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 14:17:20.962529 systemd-logind[1210]: Watching system buttons on /dev/input/event0 (Power Button) Dec 13 14:17:20.963273 systemd-logind[1210]: New seat seat0. Dec 13 14:17:20.967395 systemd[1]: Started systemd-logind.service. Dec 13 14:17:20.970501 env[1222]: time="2024-12-13T14:17:20.970448757Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:17:20.970794 update_engine[1216]: I1213 14:17:20.969974 1216 main.cc:92] Flatcar Update Engine starting Dec 13 14:17:20.974148 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 14:17:20.975541 systemd[1]: Started update-engine.service. Dec 13 14:17:20.975621 update_engine[1216]: I1213 14:17:20.975561 1216 update_check_scheduler.cc:74] Next update check in 5m28s Dec 13 14:17:20.985859 extend-filesystems[1234]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 14:17:20.985859 extend-filesystems[1234]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:17:20.985859 extend-filesystems[1234]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 14:17:20.992408 extend-filesystems[1200]: Resized filesystem in /dev/vda9 Dec 13 14:17:20.986344 systemd[1]: Started locksmithd.service. Dec 13 14:17:20.993122 bash[1250]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:17:20.988200 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:17:20.988411 systemd[1]: Finished extend-filesystems.service. Dec 13 14:17:20.990869 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:17:20.999748 env[1222]: time="2024-12-13T14:17:20.999707197Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:17:20.999955 env[1222]: time="2024-12-13T14:17:20.999934597Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:17:21.001109 env[1222]: time="2024-12-13T14:17:21.001077757Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:17:21.001219 env[1222]: time="2024-12-13T14:17:21.001202557Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:17:21.001466 env[1222]: time="2024-12-13T14:17:21.001444157Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:17:21.001574 env[1222]: time="2024-12-13T14:17:21.001556357Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:17:21.001639 env[1222]: time="2024-12-13T14:17:21.001623437Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:17:21.001689 env[1222]: time="2024-12-13T14:17:21.001676677Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:17:21.001819 env[1222]: time="2024-12-13T14:17:21.001802197Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:17:21.002105 env[1222]: time="2024-12-13T14:17:21.002081917Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:17:21.002361 env[1222]: time="2024-12-13T14:17:21.002338757Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:17:21.002432 env[1222]: time="2024-12-13T14:17:21.002417797Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:17:21.002559 env[1222]: time="2024-12-13T14:17:21.002537797Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:17:21.002633 env[1222]: time="2024-12-13T14:17:21.002618917Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:17:21.007763 env[1222]: time="2024-12-13T14:17:21.007736997Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:17:21.007868 env[1222]: time="2024-12-13T14:17:21.007852197Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:17:21.007924 env[1222]: time="2024-12-13T14:17:21.007910797Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:17:21.008006 env[1222]: time="2024-12-13T14:17:21.007990637Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:17:21.008116 env[1222]: time="2024-12-13T14:17:21.008087317Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:17:21.008208 env[1222]: time="2024-12-13T14:17:21.008191717Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:17:21.008266 env[1222]: time="2024-12-13T14:17:21.008252557Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:17:21.008699 env[1222]: time="2024-12-13T14:17:21.008667037Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:17:21.008792 env[1222]: time="2024-12-13T14:17:21.008776357Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:17:21.008853 env[1222]: time="2024-12-13T14:17:21.008839437Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:17:21.008925 env[1222]: time="2024-12-13T14:17:21.008910917Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:17:21.008982 env[1222]: time="2024-12-13T14:17:21.008968557Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:17:21.009168 env[1222]: time="2024-12-13T14:17:21.009119797Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:17:21.009329 env[1222]: time="2024-12-13T14:17:21.009309677Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:17:21.009621 env[1222]: time="2024-12-13T14:17:21.009597597Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:17:21.009753 env[1222]: time="2024-12-13T14:17:21.009724117Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:17:21.009867 env[1222]: time="2024-12-13T14:17:21.009849597Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:17:21.010093 env[1222]: time="2024-12-13T14:17:21.010075877Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:17:21.010177 env[1222]: time="2024-12-13T14:17:21.010162277Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:17:21.010234 env[1222]: time="2024-12-13T14:17:21.010221557Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:17:21.010288 env[1222]: time="2024-12-13T14:17:21.010275037Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:17:21.010358 env[1222]: time="2024-12-13T14:17:21.010345037Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:17:21.010429 env[1222]: time="2024-12-13T14:17:21.010415957Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:17:21.010487 env[1222]: time="2024-12-13T14:17:21.010474877Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:17:21.010555 env[1222]: time="2024-12-13T14:17:21.010541317Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:17:21.010624 env[1222]: time="2024-12-13T14:17:21.010610437Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:17:21.010796 env[1222]: time="2024-12-13T14:17:21.010777917Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:17:21.010866 env[1222]: time="2024-12-13T14:17:21.010851277Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:17:21.010930 env[1222]: time="2024-12-13T14:17:21.010916997Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:17:21.010986 env[1222]: time="2024-12-13T14:17:21.010973877Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:17:21.011046 env[1222]: time="2024-12-13T14:17:21.011029437Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:17:21.011097 env[1222]: time="2024-12-13T14:17:21.011084237Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:17:21.011189 env[1222]: time="2024-12-13T14:17:21.011173477Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:17:21.011292 env[1222]: time="2024-12-13T14:17:21.011276157Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:17:21.011576 env[1222]: time="2024-12-13T14:17:21.011511597Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:17:21.012201 env[1222]: time="2024-12-13T14:17:21.011901997Z" level=info msg="Connect containerd service" Dec 13 14:17:21.012201 env[1222]: time="2024-12-13T14:17:21.011947397Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:17:21.012848 env[1222]: time="2024-12-13T14:17:21.012815757Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:17:21.013333 env[1222]: time="2024-12-13T14:17:21.013312317Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:17:21.013456 env[1222]: time="2024-12-13T14:17:21.013441677Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:17:21.013586 env[1222]: time="2024-12-13T14:17:21.013571557Z" level=info msg="containerd successfully booted in 0.055169s" Dec 13 14:17:21.013644 systemd[1]: Started containerd.service. Dec 13 14:17:21.014670 env[1222]: time="2024-12-13T14:17:21.014630157Z" level=info msg="Start subscribing containerd event" Dec 13 14:17:21.014724 env[1222]: time="2024-12-13T14:17:21.014691557Z" level=info msg="Start recovering state" Dec 13 14:17:21.014762 env[1222]: time="2024-12-13T14:17:21.014755557Z" level=info msg="Start event monitor" Dec 13 14:17:21.014784 env[1222]: time="2024-12-13T14:17:21.014774637Z" level=info msg="Start snapshots syncer" Dec 13 14:17:21.014805 env[1222]: time="2024-12-13T14:17:21.014785357Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:17:21.014805 env[1222]: time="2024-12-13T14:17:21.014794117Z" level=info msg="Start streaming server" Dec 13 14:17:21.037814 locksmithd[1255]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:17:21.277489 tar[1219]: linux-arm64/LICENSE Dec 13 14:17:21.277650 tar[1219]: linux-arm64/README.md Dec 13 14:17:21.282205 systemd[1]: Finished prepare-helm.service. Dec 13 14:17:21.387353 systemd-networkd[1057]: eth0: Gained IPv6LL Dec 13 14:17:21.389187 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:17:21.390180 systemd[1]: Reached target network-online.target. Dec 13 14:17:21.392376 systemd[1]: Starting kubelet.service... Dec 13 14:17:21.753343 sshd_keygen[1220]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:17:21.771689 systemd[1]: Finished sshd-keygen.service. Dec 13 14:17:21.773851 systemd[1]: Starting issuegen.service... Dec 13 14:17:21.779051 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:17:21.779217 systemd[1]: Finished issuegen.service. Dec 13 14:17:21.781248 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:17:21.787477 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:17:21.789470 systemd[1]: Started getty@tty1.service. Dec 13 14:17:21.791269 systemd[1]: Started serial-getty@ttyAMA0.service. Dec 13 14:17:21.792079 systemd[1]: Reached target getty.target. Dec 13 14:17:21.912431 systemd[1]: Started kubelet.service. Dec 13 14:17:21.913536 systemd[1]: Reached target multi-user.target. Dec 13 14:17:21.915458 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:17:21.922272 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:17:21.922421 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:17:21.923285 systemd[1]: Startup finished in 564ms (kernel) + 4.471s (initrd) + 4.298s (userspace) = 9.335s. Dec 13 14:17:22.339865 kubelet[1279]: E1213 14:17:22.339816 1279 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:17:22.341783 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:17:22.341912 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:17:26.292466 systemd[1]: Created slice system-sshd.slice. Dec 13 14:17:26.293631 systemd[1]: Started sshd@0-10.0.0.118:22-10.0.0.1:54338.service. Dec 13 14:17:26.335694 sshd[1288]: Accepted publickey for core from 10.0.0.1 port 54338 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:17:26.337682 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:26.346913 systemd-logind[1210]: New session 1 of user core. Dec 13 14:17:26.347850 systemd[1]: Created slice user-500.slice. Dec 13 14:17:26.349035 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:17:26.357271 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:17:26.358572 systemd[1]: Starting user@500.service... Dec 13 14:17:26.361271 (systemd)[1291]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:26.431403 systemd[1291]: Queued start job for default target default.target. Dec 13 14:17:26.431917 systemd[1291]: Reached target paths.target. Dec 13 14:17:26.431938 systemd[1291]: Reached target sockets.target. Dec 13 14:17:26.431950 systemd[1291]: Reached target timers.target. Dec 13 14:17:26.431960 systemd[1291]: Reached target basic.target. Dec 13 14:17:26.432015 systemd[1291]: Reached target default.target. Dec 13 14:17:26.432042 systemd[1291]: Startup finished in 65ms. Dec 13 14:17:26.432093 systemd[1]: Started user@500.service. Dec 13 14:17:26.433379 systemd[1]: Started session-1.scope. Dec 13 14:17:26.484798 systemd[1]: Started sshd@1-10.0.0.118:22-10.0.0.1:54344.service. Dec 13 14:17:26.520080 sshd[1300]: Accepted publickey for core from 10.0.0.1 port 54344 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:17:26.521594 sshd[1300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:26.527773 systemd-logind[1210]: New session 2 of user core. Dec 13 14:17:26.527877 systemd[1]: Started session-2.scope. Dec 13 14:17:26.581354 sshd[1300]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:26.585664 systemd[1]: sshd@1-10.0.0.118:22-10.0.0.1:54344.service: Deactivated successfully. Dec 13 14:17:26.586409 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:17:26.586969 systemd-logind[1210]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:17:26.588114 systemd[1]: Started sshd@2-10.0.0.118:22-10.0.0.1:54348.service. Dec 13 14:17:26.588868 systemd-logind[1210]: Removed session 2. Dec 13 14:17:26.622985 sshd[1306]: Accepted publickey for core from 10.0.0.1 port 54348 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:17:26.624069 sshd[1306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:26.627121 systemd-logind[1210]: New session 3 of user core. Dec 13 14:17:26.627872 systemd[1]: Started session-3.scope. Dec 13 14:17:26.676919 sshd[1306]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:26.679269 systemd[1]: sshd@2-10.0.0.118:22-10.0.0.1:54348.service: Deactivated successfully. Dec 13 14:17:26.679880 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:17:26.680318 systemd-logind[1210]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:17:26.681298 systemd[1]: Started sshd@3-10.0.0.118:22-10.0.0.1:54354.service. Dec 13 14:17:26.681888 systemd-logind[1210]: Removed session 3. Dec 13 14:17:26.715992 sshd[1313]: Accepted publickey for core from 10.0.0.1 port 54354 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:17:26.717040 sshd[1313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:26.719924 systemd-logind[1210]: New session 4 of user core. Dec 13 14:17:26.720649 systemd[1]: Started session-4.scope. Dec 13 14:17:26.772530 sshd[1313]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:26.775802 systemd[1]: sshd@3-10.0.0.118:22-10.0.0.1:54354.service: Deactivated successfully. Dec 13 14:17:26.776416 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:17:26.776913 systemd-logind[1210]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:17:26.777945 systemd[1]: Started sshd@4-10.0.0.118:22-10.0.0.1:54366.service. Dec 13 14:17:26.778600 systemd-logind[1210]: Removed session 4. Dec 13 14:17:26.812731 sshd[1319]: Accepted publickey for core from 10.0.0.1 port 54366 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:17:26.813777 sshd[1319]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:26.816741 systemd-logind[1210]: New session 5 of user core. Dec 13 14:17:26.817457 systemd[1]: Started session-5.scope. Dec 13 14:17:26.883214 sudo[1322]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:17:26.883427 sudo[1322]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:17:26.896371 dbus-daemon[1198]: avc: received setenforce notice (enforcing=1) Dec 13 14:17:26.898853 sudo[1322]: pam_unix(sudo:session): session closed for user root Dec 13 14:17:26.900976 sshd[1319]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:26.903963 systemd[1]: sshd@4-10.0.0.118:22-10.0.0.1:54366.service: Deactivated successfully. Dec 13 14:17:26.904656 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:17:26.905190 systemd-logind[1210]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:17:26.906413 systemd[1]: Started sshd@5-10.0.0.118:22-10.0.0.1:54368.service. Dec 13 14:17:26.907079 systemd-logind[1210]: Removed session 5. Dec 13 14:17:26.943516 sshd[1326]: Accepted publickey for core from 10.0.0.1 port 54368 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:17:26.944721 sshd[1326]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:26.947967 systemd-logind[1210]: New session 6 of user core. Dec 13 14:17:26.948733 systemd[1]: Started session-6.scope. Dec 13 14:17:26.999561 sudo[1330]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:17:26.999766 sudo[1330]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:17:27.002181 sudo[1330]: pam_unix(sudo:session): session closed for user root Dec 13 14:17:27.006219 sudo[1329]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:17:27.006431 sudo[1329]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:17:27.014202 systemd[1]: Stopping audit-rules.service... Dec 13 14:17:27.014000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:17:27.015407 auditctl[1333]: No rules Dec 13 14:17:27.015660 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:17:27.015799 systemd[1]: Stopped audit-rules.service. Dec 13 14:17:27.017164 kernel: kauditd_printk_skb: 130 callbacks suppressed Dec 13 14:17:27.017219 kernel: audit: type=1305 audit(1734099447.014:205): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:17:27.017236 kernel: audit: type=1300 audit(1734099447.014:205): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdc5a0d20 a2=420 a3=0 items=0 ppid=1 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.014000 audit[1333]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdc5a0d20 a2=420 a3=0 items=0 ppid=1 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.017046 systemd[1]: Starting audit-rules.service... Dec 13 14:17:27.014000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:17:27.020406 kernel: audit: type=1327 audit(1734099447.014:205): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:17:27.020435 kernel: audit: type=1131 audit(1734099447.014:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:27.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:27.032437 augenrules[1350]: No rules Dec 13 14:17:27.033001 systemd[1]: Finished audit-rules.service. Dec 13 14:17:27.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:27.035158 kernel: audit: type=1130 audit(1734099447.032:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:27.035204 sudo[1329]: pam_unix(sudo:session): session closed for user root Dec 13 14:17:27.034000 audit[1329]: USER_END pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:27.034000 audit[1329]: CRED_DISP pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:27.038863 sshd[1326]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:27.041228 kernel: audit: type=1106 audit(1734099447.034:208): pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:27.041272 kernel: audit: type=1104 audit(1734099447.034:209): pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:27.041287 kernel: audit: type=1106 audit(1734099447.038:210): pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:17:27.038000 audit[1326]: USER_END pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:17:27.041636 systemd[1]: Started sshd@6-10.0.0.118:22-10.0.0.1:54384.service. Dec 13 14:17:27.042320 systemd-logind[1210]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:17:27.042536 systemd[1]: sshd@5-10.0.0.118:22-10.0.0.1:54368.service: Deactivated successfully. Dec 13 14:17:27.042799 kernel: audit: type=1104 audit(1734099447.038:211): pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:17:27.038000 audit[1326]: CRED_DISP pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:17:27.043172 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:17:27.043708 systemd-logind[1210]: Removed session 6. Dec 13 14:17:27.044812 kernel: audit: type=1130 audit(1734099447.040:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.118:22-10.0.0.1:54384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:27.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.118:22-10.0.0.1:54384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:27.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.118:22-10.0.0.1:54368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:27.077000 audit[1355]: USER_ACCT pid=1355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:17:27.079194 sshd[1355]: Accepted publickey for core from 10.0.0.1 port 54384 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:17:27.078000 audit[1355]: CRED_ACQ pid=1355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:17:27.078000 audit[1355]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffafe6cf0 a2=3 a3=1 items=0 ppid=1 pid=1355 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.078000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:27.080387 sshd[1355]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:27.083259 systemd-logind[1210]: New session 7 of user core. Dec 13 14:17:27.083932 systemd[1]: Started session-7.scope. Dec 13 14:17:27.085000 audit[1355]: USER_START pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:17:27.086000 audit[1359]: CRED_ACQ pid=1359 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:17:27.132000 audit[1360]: USER_ACCT pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:27.134008 sudo[1360]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:17:27.133000 audit[1360]: CRED_REFR pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:27.134827 sudo[1360]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:17:27.135000 audit[1360]: USER_START pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:27.194457 systemd[1]: Starting docker.service... Dec 13 14:17:27.279750 env[1372]: time="2024-12-13T14:17:27.279700677Z" level=info msg="Starting up" Dec 13 14:17:27.281242 env[1372]: time="2024-12-13T14:17:27.281215317Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:17:27.281345 env[1372]: time="2024-12-13T14:17:27.281331677Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:17:27.281409 env[1372]: time="2024-12-13T14:17:27.281394397Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:17:27.281457 env[1372]: time="2024-12-13T14:17:27.281445917Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:17:27.283591 env[1372]: time="2024-12-13T14:17:27.283568397Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:17:27.283688 env[1372]: time="2024-12-13T14:17:27.283674037Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:17:27.283744 env[1372]: time="2024-12-13T14:17:27.283731237Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:17:27.283793 env[1372]: time="2024-12-13T14:17:27.283779957Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:17:27.288053 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1486563318-merged.mount: Deactivated successfully. Dec 13 14:17:27.404553 env[1372]: time="2024-12-13T14:17:27.404458317Z" level=info msg="Loading containers: start." Dec 13 14:17:27.455000 audit[1406]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.455000 audit[1406]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffd05d6f40 a2=0 a3=1 items=0 ppid=1372 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.455000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:17:27.456000 audit[1408]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.456000 audit[1408]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffedfb7680 a2=0 a3=1 items=0 ppid=1372 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.456000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:17:27.458000 audit[1410]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.458000 audit[1410]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff0ebf550 a2=0 a3=1 items=0 ppid=1372 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.458000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:17:27.460000 audit[1412]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.460000 audit[1412]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd5533780 a2=0 a3=1 items=0 ppid=1372 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.460000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:17:27.464000 audit[1414]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.464000 audit[1414]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffa566280 a2=0 a3=1 items=0 ppid=1372 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.464000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:17:27.491000 audit[1419]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.491000 audit[1419]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc7569000 a2=0 a3=1 items=0 ppid=1372 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.491000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:17:27.497000 audit[1421]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.497000 audit[1421]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffeebb34e0 a2=0 a3=1 items=0 ppid=1372 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.497000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:17:27.498000 audit[1423]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.498000 audit[1423]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffd647be90 a2=0 a3=1 items=0 ppid=1372 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.498000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:17:27.500000 audit[1425]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.500000 audit[1425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffc94ff880 a2=0 a3=1 items=0 ppid=1372 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.500000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:17:27.506000 audit[1429]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.506000 audit[1429]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffdedbeb50 a2=0 a3=1 items=0 ppid=1372 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.506000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:17:27.512000 audit[1430]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.512000 audit[1430]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe35fc100 a2=0 a3=1 items=0 ppid=1372 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.512000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:17:27.522149 kernel: Initializing XFRM netlink socket Dec 13 14:17:27.544796 env[1372]: time="2024-12-13T14:17:27.544743517Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:17:27.560000 audit[1438]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.560000 audit[1438]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffc44b19c0 a2=0 a3=1 items=0 ppid=1372 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.560000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:17:27.575000 audit[1441]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.575000 audit[1441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffcad2a9b0 a2=0 a3=1 items=0 ppid=1372 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.575000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:17:27.577000 audit[1444]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.577000 audit[1444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd1c60850 a2=0 a3=1 items=0 ppid=1372 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.577000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:17:27.579000 audit[1446]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.579000 audit[1446]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd4cfda60 a2=0 a3=1 items=0 ppid=1372 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.579000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:17:27.581000 audit[1448]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.581000 audit[1448]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffe3b0eac0 a2=0 a3=1 items=0 ppid=1372 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.581000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:17:27.583000 audit[1450]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.583000 audit[1450]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffea9bec20 a2=0 a3=1 items=0 ppid=1372 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.583000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:17:27.585000 audit[1452]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.585000 audit[1452]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffff6db9b00 a2=0 a3=1 items=0 ppid=1372 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.585000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:17:27.591000 audit[1455]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.591000 audit[1455]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffe1c82690 a2=0 a3=1 items=0 ppid=1372 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.591000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:17:27.593000 audit[1457]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.593000 audit[1457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffe2a1fd70 a2=0 a3=1 items=0 ppid=1372 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.593000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:17:27.595000 audit[1459]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.595000 audit[1459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffc154d4c0 a2=0 a3=1 items=0 ppid=1372 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.595000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:17:27.597000 audit[1461]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.597000 audit[1461]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffca7060f0 a2=0 a3=1 items=0 ppid=1372 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.597000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:17:27.598801 systemd-networkd[1057]: docker0: Link UP Dec 13 14:17:27.604000 audit[1465]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.604000 audit[1465]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffde547830 a2=0 a3=1 items=0 ppid=1372 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.604000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:17:27.618000 audit[1466]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:27.618000 audit[1466]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe1319b90 a2=0 a3=1 items=0 ppid=1372 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:27.618000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:17:27.620431 env[1372]: time="2024-12-13T14:17:27.620387717Z" level=info msg="Loading containers: done." Dec 13 14:17:27.639499 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2696141045-merged.mount: Deactivated successfully. Dec 13 14:17:27.644298 env[1372]: time="2024-12-13T14:17:27.644252157Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:17:27.644460 env[1372]: time="2024-12-13T14:17:27.644429237Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:17:27.644569 env[1372]: time="2024-12-13T14:17:27.644543317Z" level=info msg="Daemon has completed initialization" Dec 13 14:17:27.660682 systemd[1]: Started docker.service. Dec 13 14:17:27.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:27.669364 env[1372]: time="2024-12-13T14:17:27.669314597Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:17:28.281378 env[1222]: time="2024-12-13T14:17:28.281335437Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\"" Dec 13 14:17:28.920618 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2334769246.mount: Deactivated successfully. Dec 13 14:17:30.148795 env[1222]: time="2024-12-13T14:17:30.148750237Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:30.150790 env[1222]: time="2024-12-13T14:17:30.150761197Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e1123d6ebadbafa6eb77a9047f23f20befbbe2f177eb473a81b27a5de8c2ec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:30.153010 env[1222]: time="2024-12-13T14:17:30.152980477Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:30.155177 env[1222]: time="2024-12-13T14:17:30.155149437Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ace6a943b058439bd6daeb74f152e7c36e6fc0b5e481cdff9364cd6ca0473e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:30.156079 env[1222]: time="2024-12-13T14:17:30.156050197Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\" returns image reference \"sha256:3e1123d6ebadbafa6eb77a9047f23f20befbbe2f177eb473a81b27a5de8c2ec5\"" Dec 13 14:17:30.157427 env[1222]: time="2024-12-13T14:17:30.157395797Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\"" Dec 13 14:17:31.554872 env[1222]: time="2024-12-13T14:17:31.554824157Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:31.556307 env[1222]: time="2024-12-13T14:17:31.556270197Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5369864a42bf2c01d3ad462832526b7d3e40620c0e75fecefbffc203562ad55,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:31.558028 env[1222]: time="2024-12-13T14:17:31.557995237Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:31.559757 env[1222]: time="2024-12-13T14:17:31.559722637Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4bd1d4a449e7a1a4f375bd7c71abf48a95f8949b38f725ded255077329f21f7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:31.561273 env[1222]: time="2024-12-13T14:17:31.561232397Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\" returns image reference \"sha256:d5369864a42bf2c01d3ad462832526b7d3e40620c0e75fecefbffc203562ad55\"" Dec 13 14:17:31.561747 env[1222]: time="2024-12-13T14:17:31.561724357Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\"" Dec 13 14:17:32.560787 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:17:32.560963 systemd[1]: Stopped kubelet.service. Dec 13 14:17:32.562330 systemd[1]: Starting kubelet.service... Dec 13 14:17:32.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:32.564697 kernel: kauditd_printk_skb: 84 callbacks suppressed Dec 13 14:17:32.564756 kernel: audit: type=1130 audit(1734099452.559:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:32.564778 kernel: audit: type=1131 audit(1734099452.559:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:32.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:32.648263 systemd[1]: Started kubelet.service. Dec 13 14:17:32.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:32.651156 kernel: audit: type=1130 audit(1734099452.647:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:32.689952 kubelet[1507]: E1213 14:17:32.689903 1507 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:17:32.692611 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:17:32.692734 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:17:32.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:17:32.695153 kernel: audit: type=1131 audit(1734099452.691:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:17:32.873896 env[1222]: time="2024-12-13T14:17:32.873791957Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:32.875473 env[1222]: time="2024-12-13T14:17:32.875444757Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d99fc9a32f6b42ab5537eec09d599efae0f61c109406dae1ba255cec288fcb95,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:32.878001 env[1222]: time="2024-12-13T14:17:32.877968997Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:32.880060 env[1222]: time="2024-12-13T14:17:32.880025077Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:1a3081cb7d21763d22eb2c0781cc462d89f501ed523ad558dea1226f128fbfdd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:32.880727 env[1222]: time="2024-12-13T14:17:32.880690917Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\" returns image reference \"sha256:d99fc9a32f6b42ab5537eec09d599efae0f61c109406dae1ba255cec288fcb95\"" Dec 13 14:17:32.881409 env[1222]: time="2024-12-13T14:17:32.881237437Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 14:17:34.017566 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4127980424.mount: Deactivated successfully. Dec 13 14:17:34.572401 env[1222]: time="2024-12-13T14:17:34.572347997Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:34.574202 env[1222]: time="2024-12-13T14:17:34.574166957Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:34e142197cb996099cc1e98902c112642b3fb3dc559140c0a95279aa8d254d3a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:34.576394 env[1222]: time="2024-12-13T14:17:34.576361197Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:34.578273 env[1222]: time="2024-12-13T14:17:34.578237917Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:34.578821 env[1222]: time="2024-12-13T14:17:34.578787077Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:34e142197cb996099cc1e98902c112642b3fb3dc559140c0a95279aa8d254d3a\"" Dec 13 14:17:34.579758 env[1222]: time="2024-12-13T14:17:34.579734197Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:17:35.148834 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount826990828.mount: Deactivated successfully. Dec 13 14:17:35.948226 env[1222]: time="2024-12-13T14:17:35.948171117Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:35.951811 env[1222]: time="2024-12-13T14:17:35.951755357Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:35.953642 env[1222]: time="2024-12-13T14:17:35.953608237Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:35.955678 env[1222]: time="2024-12-13T14:17:35.955643837Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:35.956477 env[1222]: time="2024-12-13T14:17:35.956443637Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" Dec 13 14:17:35.957052 env[1222]: time="2024-12-13T14:17:35.957029717Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Dec 13 14:17:36.442483 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1944913959.mount: Deactivated successfully. Dec 13 14:17:36.446546 env[1222]: time="2024-12-13T14:17:36.446498277Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:36.447676 env[1222]: time="2024-12-13T14:17:36.447632917Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:36.449117 env[1222]: time="2024-12-13T14:17:36.449092997Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:36.450252 env[1222]: time="2024-12-13T14:17:36.450217717Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:36.450907 env[1222]: time="2024-12-13T14:17:36.450875997Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8\"" Dec 13 14:17:36.451300 env[1222]: time="2024-12-13T14:17:36.451272797Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Dec 13 14:17:36.973484 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2867169737.mount: Deactivated successfully. Dec 13 14:17:39.098559 env[1222]: time="2024-12-13T14:17:39.098489957Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:39.251379 env[1222]: time="2024-12-13T14:17:39.251324077Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:39.253681 env[1222]: time="2024-12-13T14:17:39.253641477Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:39.255984 env[1222]: time="2024-12-13T14:17:39.255948797Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:39.256948 env[1222]: time="2024-12-13T14:17:39.256893237Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da\"" Dec 13 14:17:42.810760 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:17:42.810936 systemd[1]: Stopped kubelet.service. Dec 13 14:17:42.812323 systemd[1]: Starting kubelet.service... Dec 13 14:17:42.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:42.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:42.815916 kernel: audit: type=1130 audit(1734099462.809:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:42.815964 kernel: audit: type=1131 audit(1734099462.809:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:42.901984 systemd[1]: Started kubelet.service. Dec 13 14:17:42.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:42.905144 kernel: audit: type=1130 audit(1734099462.901:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:42.935979 kubelet[1539]: E1213 14:17:42.935942 1539 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:17:42.937804 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:17:42.937926 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:17:42.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:17:42.940151 kernel: audit: type=1131 audit(1734099462.936:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:17:44.860362 systemd[1]: Stopped kubelet.service. Dec 13 14:17:44.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:44.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:44.863114 systemd[1]: Starting kubelet.service... Dec 13 14:17:44.864016 kernel: audit: type=1130 audit(1734099464.859:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:44.864085 kernel: audit: type=1131 audit(1734099464.859:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:44.886801 systemd[1]: Reloading. Dec 13 14:17:44.946377 /usr/lib/systemd/system-generators/torcx-generator[1576]: time="2024-12-13T14:17:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:17:44.946700 /usr/lib/systemd/system-generators/torcx-generator[1576]: time="2024-12-13T14:17:44Z" level=info msg="torcx already run" Dec 13 14:17:45.047172 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:17:45.047193 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:17:45.062294 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:17:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.113658 kernel: audit: type=1400 audit(1734099465.108:257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.113712 kernel: audit: type=1400 audit(1734099465.108:258): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.113737 kernel: audit: type=1400 audit(1734099465.108:259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.115312 kernel: audit: type=1400 audit(1734099465.108:260): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.110000 audit: BPF prog-id=43 op=LOAD Dec 13 14:17:45.110000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:17:45.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.112000 audit: BPF prog-id=44 op=LOAD Dec 13 14:17:45.112000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:17:45.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.114000 audit: BPF prog-id=45 op=LOAD Dec 13 14:17:45.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.115000 audit: BPF prog-id=46 op=LOAD Dec 13 14:17:45.115000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:17:45.115000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit: BPF prog-id=47 op=LOAD Dec 13 14:17:45.117000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit: BPF prog-id=48 op=LOAD Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.117000 audit: BPF prog-id=49 op=LOAD Dec 13 14:17:45.117000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:17:45.117000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit: BPF prog-id=50 op=LOAD Dec 13 14:17:45.118000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit: BPF prog-id=51 op=LOAD Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.118000 audit: BPF prog-id=52 op=LOAD Dec 13 14:17:45.118000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:17:45.118000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:17:45.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.119000 audit: BPF prog-id=53 op=LOAD Dec 13 14:17:45.119000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:17:45.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.120000 audit: BPF prog-id=54 op=LOAD Dec 13 14:17:45.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.120000 audit: BPF prog-id=55 op=LOAD Dec 13 14:17:45.120000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:17:45.120000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:17:45.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.121000 audit: BPF prog-id=56 op=LOAD Dec 13 14:17:45.121000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:17:45.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:45.122000 audit: BPF prog-id=57 op=LOAD Dec 13 14:17:45.122000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:17:45.132981 systemd[1]: Started kubelet.service. Dec 13 14:17:45.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:45.134672 systemd[1]: Stopping kubelet.service... Dec 13 14:17:45.134995 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:17:45.135195 systemd[1]: Stopped kubelet.service. Dec 13 14:17:45.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:45.136811 systemd[1]: Starting kubelet.service... Dec 13 14:17:45.219409 systemd[1]: Started kubelet.service. Dec 13 14:17:45.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:45.252076 kubelet[1619]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:17:45.252076 kubelet[1619]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:17:45.252076 kubelet[1619]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:17:45.252425 kubelet[1619]: I1213 14:17:45.252100 1619 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:17:46.342068 kubelet[1619]: I1213 14:17:46.342018 1619 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:17:46.342068 kubelet[1619]: I1213 14:17:46.342054 1619 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:17:46.342390 kubelet[1619]: I1213 14:17:46.342306 1619 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:17:46.373416 kubelet[1619]: E1213 14:17:46.373382 1619 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.118:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.118:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:17:46.374351 kubelet[1619]: I1213 14:17:46.374327 1619 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:17:46.387552 kubelet[1619]: E1213 14:17:46.387523 1619 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:17:46.387645 kubelet[1619]: I1213 14:17:46.387632 1619 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:17:46.391287 kubelet[1619]: I1213 14:17:46.391238 1619 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:17:46.392282 kubelet[1619]: I1213 14:17:46.392260 1619 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:17:46.392538 kubelet[1619]: I1213 14:17:46.392508 1619 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:17:46.392757 kubelet[1619]: I1213 14:17:46.392598 1619 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:17:46.393010 kubelet[1619]: I1213 14:17:46.392997 1619 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:17:46.393070 kubelet[1619]: I1213 14:17:46.393060 1619 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:17:46.393310 kubelet[1619]: I1213 14:17:46.393295 1619 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:17:46.397874 kubelet[1619]: I1213 14:17:46.397856 1619 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:17:46.397983 kubelet[1619]: I1213 14:17:46.397971 1619 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:17:46.398141 kubelet[1619]: I1213 14:17:46.398116 1619 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:17:46.398296 kubelet[1619]: I1213 14:17:46.398285 1619 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:17:46.400806 kubelet[1619]: W1213 14:17:46.400759 1619 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.118:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused Dec 13 14:17:46.400938 kubelet[1619]: E1213 14:17:46.400916 1619 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.118:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.118:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:17:46.401356 kubelet[1619]: W1213 14:17:46.401319 1619 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.118:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused Dec 13 14:17:46.401405 kubelet[1619]: E1213 14:17:46.401377 1619 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.118:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.118:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:17:46.405410 kubelet[1619]: I1213 14:17:46.405388 1619 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:17:46.407181 kubelet[1619]: I1213 14:17:46.407164 1619 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:17:46.407912 kubelet[1619]: W1213 14:17:46.407885 1619 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:17:46.408610 kubelet[1619]: I1213 14:17:46.408594 1619 server.go:1269] "Started kubelet" Dec 13 14:17:46.409341 kubelet[1619]: I1213 14:17:46.409303 1619 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:17:46.409649 kubelet[1619]: I1213 14:17:46.409627 1619 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:17:46.409771 kubelet[1619]: I1213 14:17:46.409753 1619 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:17:46.408000 audit[1619]: AVC avc: denied { mac_admin } for pid=1619 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:46.408000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:17:46.408000 audit[1619]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000735110 a1=40004b6900 a2=40007350e0 a3=25 items=0 ppid=1 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:46.408000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:17:46.408000 audit[1619]: AVC avc: denied { mac_admin } for pid=1619 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:46.408000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:17:46.408000 audit[1619]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000165d60 a1=40004b6918 a2=40007351a0 a3=25 items=0 ppid=1 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:46.408000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:17:46.410293 kubelet[1619]: I1213 14:17:46.410001 1619 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:17:46.410293 kubelet[1619]: I1213 14:17:46.410036 1619 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:17:46.410293 kubelet[1619]: I1213 14:17:46.410091 1619 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:17:46.410972 kubelet[1619]: I1213 14:17:46.410935 1619 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:17:46.412668 kubelet[1619]: I1213 14:17:46.412412 1619 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:17:46.414448 kubelet[1619]: I1213 14:17:46.414422 1619 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:17:46.414641 kubelet[1619]: I1213 14:17:46.414625 1619 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:17:46.414772 kubelet[1619]: I1213 14:17:46.414762 1619 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:17:46.414834 kubelet[1619]: E1213 14:17:46.414793 1619 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:17:46.414901 kubelet[1619]: E1213 14:17:46.414857 1619 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.118:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.118:6443: connect: connection refused" interval="200ms" Dec 13 14:17:46.413000 audit[1631]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:46.413000 audit[1631]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff7e92c10 a2=0 a3=1 items=0 ppid=1619 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:46.413000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:17:46.415079 kubelet[1619]: E1213 14:17:46.414937 1619 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:17:46.415210 kubelet[1619]: I1213 14:17:46.415046 1619 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:17:46.415373 kubelet[1619]: I1213 14:17:46.415352 1619 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:17:46.415544 kubelet[1619]: W1213 14:17:46.415382 1619 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.118:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused Dec 13 14:17:46.415601 kubelet[1619]: E1213 14:17:46.415556 1619 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.118:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.118:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:17:46.414000 audit[1632]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:46.414000 audit[1632]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd263e760 a2=0 a3=1 items=0 ppid=1619 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:46.414000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:17:46.416188 kubelet[1619]: E1213 14:17:46.415078 1619 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.118:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.118:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.1810c246ec7a1ecd default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 14:17:46.408566477 +0000 UTC m=+1.185934441,LastTimestamp:2024-12-13 14:17:46.408566477 +0000 UTC m=+1.185934441,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 14:17:46.417372 kubelet[1619]: I1213 14:17:46.417351 1619 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:17:46.417000 audit[1634]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:46.417000 audit[1634]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc26d9a00 a2=0 a3=1 items=0 ppid=1619 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:46.417000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:17:46.424000 audit[1637]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1637 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:46.424000 audit[1637]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffee389fb0 a2=0 a3=1 items=0 ppid=1619 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:46.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:17:46.430418 kubelet[1619]: I1213 14:17:46.430397 1619 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:17:46.430418 kubelet[1619]: I1213 14:17:46.430415 1619 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:17:46.430528 kubelet[1619]: I1213 14:17:46.430432 1619 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:17:46.432000 audit[1644]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:46.432000 audit[1644]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffc6e01430 a2=0 a3=1 items=0 ppid=1619 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:46.432000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:17:46.434619 kubelet[1619]: I1213 14:17:46.434565 1619 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:17:46.434000 audit[1646]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:46.434000 audit[1646]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe6e5af60 a2=0 a3=1 items=0 ppid=1619 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:46.434000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:17:46.435686 kubelet[1619]: I1213 14:17:46.435664 1619 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:17:46.435762 kubelet[1619]: I1213 14:17:46.435752 1619 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:17:46.435829 kubelet[1619]: I1213 14:17:46.435818 1619 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:17:46.435930 kubelet[1619]: E1213 14:17:46.435912 1619 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:17:46.436497 kubelet[1619]: W1213 14:17:46.436472 1619 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.118:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused Dec 13 14:17:46.436637 kubelet[1619]: E1213 14:17:46.436614 1619 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.118:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.118:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:17:46.435000 audit[1648]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:46.435000 audit[1648]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffec473d80 a2=0 a3=1 items=0 ppid=1619 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:46.435000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:17:46.436000 audit[1647]: NETFILTER_CFG table=mangle:33 family=2 entries=1 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:46.436000 audit[1647]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdde76510 a2=0 a3=1 items=0 ppid=1619 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:46.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:17:46.436000 audit[1649]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1649 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:46.436000 audit[1649]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd1e6a790 a2=0 a3=1 items=0 ppid=1619 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:46.436000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:17:46.437000 audit[1650]: NETFILTER_CFG table=filter:35 family=10 entries=2 op=nft_register_chain pid=1650 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:46.437000 audit[1650]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffa8e2730 a2=0 a3=1 items=0 ppid=1619 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:46.437000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:17:46.438000 audit[1651]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=1651 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:46.438000 audit[1651]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd7a93370 a2=0 a3=1 items=0 ppid=1619 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:46.438000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:17:46.439000 audit[1652]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1652 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:46.439000 audit[1652]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffccfdc390 a2=0 a3=1 items=0 ppid=1619 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:46.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:17:46.493465 kubelet[1619]: I1213 14:17:46.493421 1619 policy_none.go:49] "None policy: Start" Dec 13 14:17:46.494247 kubelet[1619]: I1213 14:17:46.494223 1619 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:17:46.494322 kubelet[1619]: I1213 14:17:46.494263 1619 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:17:46.499268 systemd[1]: Created slice kubepods.slice. Dec 13 14:17:46.504540 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:17:46.506964 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:17:46.515625 kubelet[1619]: E1213 14:17:46.515595 1619 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:17:46.516000 audit[1619]: AVC avc: denied { mac_admin } for pid=1619 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:46.516000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:17:46.516000 audit[1619]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ed6780 a1=4000e9b740 a2=4000ed6750 a3=25 items=0 ppid=1 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:46.516000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:17:46.517943 kubelet[1619]: I1213 14:17:46.517735 1619 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:17:46.517943 kubelet[1619]: I1213 14:17:46.517811 1619 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:17:46.517943 kubelet[1619]: I1213 14:17:46.517905 1619 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:17:46.517943 kubelet[1619]: I1213 14:17:46.517916 1619 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:17:46.518175 kubelet[1619]: I1213 14:17:46.518155 1619 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:17:46.519747 kubelet[1619]: E1213 14:17:46.519718 1619 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Dec 13 14:17:46.542835 systemd[1]: Created slice kubepods-burstable-pod50a9ae38ddb3bec3278d8dc73a6a7009.slice. Dec 13 14:17:46.566614 systemd[1]: Created slice kubepods-burstable-poda52b86ce975f496e6002ba953fa9b888.slice. Dec 13 14:17:46.569569 systemd[1]: Created slice kubepods-burstable-podf6ee7941e59b41ec1b8583aa84179840.slice. Dec 13 14:17:46.616186 kubelet[1619]: E1213 14:17:46.615416 1619 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.118:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.118:6443: connect: connection refused" interval="400ms" Dec 13 14:17:46.617530 kubelet[1619]: I1213 14:17:46.617286 1619 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:17:46.618115 kubelet[1619]: I1213 14:17:46.618083 1619 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:17:46.618115 kubelet[1619]: I1213 14:17:46.618117 1619 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f6ee7941e59b41ec1b8583aa84179840-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"f6ee7941e59b41ec1b8583aa84179840\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:17:46.618200 kubelet[1619]: I1213 14:17:46.618146 1619 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:17:46.618200 kubelet[1619]: I1213 14:17:46.618163 1619 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:17:46.618200 kubelet[1619]: I1213 14:17:46.618181 1619 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a52b86ce975f496e6002ba953fa9b888-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"a52b86ce975f496e6002ba953fa9b888\") " pod="kube-system/kube-scheduler-localhost" Dec 13 14:17:46.618200 kubelet[1619]: I1213 14:17:46.618195 1619 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f6ee7941e59b41ec1b8583aa84179840-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"f6ee7941e59b41ec1b8583aa84179840\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:17:46.618295 kubelet[1619]: I1213 14:17:46.618210 1619 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f6ee7941e59b41ec1b8583aa84179840-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"f6ee7941e59b41ec1b8583aa84179840\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:17:46.618295 kubelet[1619]: I1213 14:17:46.618224 1619 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:17:46.619081 kubelet[1619]: I1213 14:17:46.619057 1619 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:17:46.619464 kubelet[1619]: E1213 14:17:46.619422 1619 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.118:6443/api/v1/nodes\": dial tcp 10.0.0.118:6443: connect: connection refused" node="localhost" Dec 13 14:17:46.821471 kubelet[1619]: I1213 14:17:46.821441 1619 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:17:46.821977 kubelet[1619]: E1213 14:17:46.821933 1619 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.118:6443/api/v1/nodes\": dial tcp 10.0.0.118:6443: connect: connection refused" node="localhost" Dec 13 14:17:46.866263 kubelet[1619]: E1213 14:17:46.866179 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:46.867173 env[1222]: time="2024-12-13T14:17:46.867113557Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:50a9ae38ddb3bec3278d8dc73a6a7009,Namespace:kube-system,Attempt:0,}" Dec 13 14:17:46.868260 kubelet[1619]: E1213 14:17:46.868239 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:46.868727 env[1222]: time="2024-12-13T14:17:46.868688557Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:a52b86ce975f496e6002ba953fa9b888,Namespace:kube-system,Attempt:0,}" Dec 13 14:17:46.872014 kubelet[1619]: E1213 14:17:46.871984 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:46.872359 env[1222]: time="2024-12-13T14:17:46.872321677Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:f6ee7941e59b41ec1b8583aa84179840,Namespace:kube-system,Attempt:0,}" Dec 13 14:17:47.015915 kubelet[1619]: E1213 14:17:47.015872 1619 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.118:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.118:6443: connect: connection refused" interval="800ms" Dec 13 14:17:47.216022 kubelet[1619]: W1213 14:17:47.215887 1619 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.118:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused Dec 13 14:17:47.216022 kubelet[1619]: E1213 14:17:47.215963 1619 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.118:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.118:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:17:47.223529 kubelet[1619]: I1213 14:17:47.223496 1619 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:17:47.223835 kubelet[1619]: E1213 14:17:47.223774 1619 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.118:6443/api/v1/nodes\": dial tcp 10.0.0.118:6443: connect: connection refused" node="localhost" Dec 13 14:17:47.367026 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3221289256.mount: Deactivated successfully. Dec 13 14:17:47.370862 env[1222]: time="2024-12-13T14:17:47.370815517Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:47.373233 env[1222]: time="2024-12-13T14:17:47.373177957Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:47.374252 env[1222]: time="2024-12-13T14:17:47.374225277Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:47.375256 env[1222]: time="2024-12-13T14:17:47.375212357Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:47.376872 env[1222]: time="2024-12-13T14:17:47.376841877Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:47.377550 env[1222]: time="2024-12-13T14:17:47.377528317Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:47.381778 env[1222]: time="2024-12-13T14:17:47.381750157Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:47.385185 env[1222]: time="2024-12-13T14:17:47.385150237Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:47.387350 env[1222]: time="2024-12-13T14:17:47.387322957Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:47.388159 env[1222]: time="2024-12-13T14:17:47.388114757Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:47.388847 env[1222]: time="2024-12-13T14:17:47.388824037Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:47.389662 env[1222]: time="2024-12-13T14:17:47.389637877Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:17:47.424654 env[1222]: time="2024-12-13T14:17:47.424582797Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:47.424654 env[1222]: time="2024-12-13T14:17:47.424612597Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:47.424654 env[1222]: time="2024-12-13T14:17:47.424622757Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:47.424654 env[1222]: time="2024-12-13T14:17:47.424283557Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:47.424654 env[1222]: time="2024-12-13T14:17:47.424330237Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:47.424654 env[1222]: time="2024-12-13T14:17:47.424340237Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:47.424850 env[1222]: time="2024-12-13T14:17:47.424720397Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f277374a98101663011568f012ccee4dbe367d0b9ee355e24912846e898ab814 pid=1675 runtime=io.containerd.runc.v2 Dec 13 14:17:47.425028 env[1222]: time="2024-12-13T14:17:47.424979557Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:47.425028 env[1222]: time="2024-12-13T14:17:47.425009517Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:47.425028 env[1222]: time="2024-12-13T14:17:47.425019557Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:47.425176 env[1222]: time="2024-12-13T14:17:47.425147037Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e83d1e1e7f05bd72577d18b68a38f1d516dc37ce016d0e8ffcb47f78f1718b25 pid=1677 runtime=io.containerd.runc.v2 Dec 13 14:17:47.425532 env[1222]: time="2024-12-13T14:17:47.425243917Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6fec36bae5e4e940a5edd6e67390e60cd8825fc009eed4a1439700dcbb178c35 pid=1676 runtime=io.containerd.runc.v2 Dec 13 14:17:47.437348 systemd[1]: Started cri-containerd-6fec36bae5e4e940a5edd6e67390e60cd8825fc009eed4a1439700dcbb178c35.scope. Dec 13 14:17:47.444281 systemd[1]: Started cri-containerd-e83d1e1e7f05bd72577d18b68a38f1d516dc37ce016d0e8ffcb47f78f1718b25.scope. Dec 13 14:17:47.453717 systemd[1]: Started cri-containerd-f277374a98101663011568f012ccee4dbe367d0b9ee355e24912846e898ab814.scope. Dec 13 14:17:47.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.476000 audit: BPF prog-id=58 op=LOAD Dec 13 14:17:47.476000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.476000 audit[1707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1676 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666656333366261653565346539343061356564643665363733393065 Dec 13 14:17:47.476000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.476000 audit[1707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1676 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666656333366261653565346539343061356564643665363733393065 Dec 13 14:17:47.476000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.476000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.476000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.476000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.476000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.476000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.476000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.476000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.476000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.476000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.476000 audit: BPF prog-id=59 op=LOAD Dec 13 14:17:47.476000 audit[1707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1676 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666656333366261653565346539343061356564643665363733393065 Dec 13 14:17:47.477000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.477000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.477000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.477000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.477000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.477000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.477000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.477000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.477000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.477000 audit: BPF prog-id=60 op=LOAD Dec 13 14:17:47.477000 audit[1707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1676 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666656333366261653565346539343061356564643665363733393065 Dec 13 14:17:47.477000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:17:47.477000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:17:47.477000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.477000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.477000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.477000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.477000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.477000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.477000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.477000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.477000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.477000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.477000 audit: BPF prog-id=61 op=LOAD Dec 13 14:17:47.477000 audit[1707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1676 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666656333366261653565346539343061356564643665363733393065 Dec 13 14:17:47.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.479000 audit: BPF prog-id=62 op=LOAD Dec 13 14:17:47.480000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.480000 audit[1704]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1677 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538336431653165376630356264373235373764313862363861333866 Dec 13 14:17:47.480000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.480000 audit[1704]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1677 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538336431653165376630356264373235373764313862363861333866 Dec 13 14:17:47.480000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.480000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.480000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.480000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.480000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.480000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.480000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.480000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.480000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.480000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.480000 audit: BPF prog-id=63 op=LOAD Dec 13 14:17:47.480000 audit[1704]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1677 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538336431653165376630356264373235373764313862363861333866 Dec 13 14:17:47.481000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.481000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.481000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.481000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.481000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.481000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.481000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.481000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.481000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.481000 audit: BPF prog-id=64 op=LOAD Dec 13 14:17:47.481000 audit[1704]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1677 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538336431653165376630356264373235373764313862363861333866 Dec 13 14:17:47.481000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:17:47.481000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:17:47.482000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.482000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.482000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.482000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.482000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.482000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.482000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.482000 audit[1704]: AVC avc: denied { perfmon } for pid=1704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.482000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.482000 audit[1704]: AVC avc: denied { bpf } for pid=1704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.482000 audit: BPF prog-id=65 op=LOAD Dec 13 14:17:47.482000 audit[1704]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1677 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538336431653165376630356264373235373764313862363861333866 Dec 13 14:17:47.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.484000 audit: BPF prog-id=66 op=LOAD Dec 13 14:17:47.485000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.485000 audit[1708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=1675 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632373733373461393831303136363330313135363866303132636365 Dec 13 14:17:47.485000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.485000 audit[1708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=1675 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632373733373461393831303136363330313135363866303132636365 Dec 13 14:17:47.486000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.486000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.486000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.486000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.486000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.486000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.486000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.486000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.486000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.486000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.486000 audit: BPF prog-id=67 op=LOAD Dec 13 14:17:47.486000 audit[1708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=1675 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632373733373461393831303136363330313135363866303132636365 Dec 13 14:17:47.488000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.488000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.488000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.488000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.488000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.488000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.488000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.488000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.488000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.488000 audit: BPF prog-id=68 op=LOAD Dec 13 14:17:47.488000 audit[1708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=1675 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632373733373461393831303136363330313135363866303132636365 Dec 13 14:17:47.489000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:17:47.489000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:17:47.489000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.489000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.489000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.489000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.489000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.489000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.489000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.489000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.489000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.489000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.489000 audit: BPF prog-id=69 op=LOAD Dec 13 14:17:47.489000 audit[1708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=1675 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632373733373461393831303136363330313135363866303132636365 Dec 13 14:17:47.496794 env[1222]: time="2024-12-13T14:17:47.496735957Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:a52b86ce975f496e6002ba953fa9b888,Namespace:kube-system,Attempt:0,} returns sandbox id \"6fec36bae5e4e940a5edd6e67390e60cd8825fc009eed4a1439700dcbb178c35\"" Dec 13 14:17:47.497656 kubelet[1619]: E1213 14:17:47.497632 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:47.500014 env[1222]: time="2024-12-13T14:17:47.499510117Z" level=info msg="CreateContainer within sandbox \"6fec36bae5e4e940a5edd6e67390e60cd8825fc009eed4a1439700dcbb178c35\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:17:47.511510 env[1222]: time="2024-12-13T14:17:47.511475877Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:f6ee7941e59b41ec1b8583aa84179840,Namespace:kube-system,Attempt:0,} returns sandbox id \"f277374a98101663011568f012ccee4dbe367d0b9ee355e24912846e898ab814\"" Dec 13 14:17:47.512424 env[1222]: time="2024-12-13T14:17:47.512214477Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:50a9ae38ddb3bec3278d8dc73a6a7009,Namespace:kube-system,Attempt:0,} returns sandbox id \"e83d1e1e7f05bd72577d18b68a38f1d516dc37ce016d0e8ffcb47f78f1718b25\"" Dec 13 14:17:47.512500 kubelet[1619]: E1213 14:17:47.512265 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:47.512853 kubelet[1619]: E1213 14:17:47.512730 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:47.513190 env[1222]: time="2024-12-13T14:17:47.513082597Z" level=info msg="CreateContainer within sandbox \"6fec36bae5e4e940a5edd6e67390e60cd8825fc009eed4a1439700dcbb178c35\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"9dca9149c1e579909beca71710f709ebe9325323160f0690448cdf1017ad075e\"" Dec 13 14:17:47.513817 env[1222]: time="2024-12-13T14:17:47.513777517Z" level=info msg="CreateContainer within sandbox \"f277374a98101663011568f012ccee4dbe367d0b9ee355e24912846e898ab814\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:17:47.514322 env[1222]: time="2024-12-13T14:17:47.514295437Z" level=info msg="CreateContainer within sandbox \"e83d1e1e7f05bd72577d18b68a38f1d516dc37ce016d0e8ffcb47f78f1718b25\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:17:47.514602 env[1222]: time="2024-12-13T14:17:47.514580837Z" level=info msg="StartContainer for \"9dca9149c1e579909beca71710f709ebe9325323160f0690448cdf1017ad075e\"" Dec 13 14:17:47.527309 env[1222]: time="2024-12-13T14:17:47.527266477Z" level=info msg="CreateContainer within sandbox \"f277374a98101663011568f012ccee4dbe367d0b9ee355e24912846e898ab814\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"4b8d47c3fce4894bf501e7c26607f777fab8b4d87b27c3cdcd6b4605b948971a\"" Dec 13 14:17:47.528199 env[1222]: time="2024-12-13T14:17:47.527667477Z" level=info msg="StartContainer for \"4b8d47c3fce4894bf501e7c26607f777fab8b4d87b27c3cdcd6b4605b948971a\"" Dec 13 14:17:47.529315 systemd[1]: Started cri-containerd-9dca9149c1e579909beca71710f709ebe9325323160f0690448cdf1017ad075e.scope. Dec 13 14:17:47.530414 env[1222]: time="2024-12-13T14:17:47.529687277Z" level=info msg="CreateContainer within sandbox \"e83d1e1e7f05bd72577d18b68a38f1d516dc37ce016d0e8ffcb47f78f1718b25\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"d9d2ff8fa2b6bd81c19925abf56a537ceaf27e56aed7a49c53554a46c71fcba2\"" Dec 13 14:17:47.530545 env[1222]: time="2024-12-13T14:17:47.530511117Z" level=info msg="StartContainer for \"d9d2ff8fa2b6bd81c19925abf56a537ceaf27e56aed7a49c53554a46c71fcba2\"" Dec 13 14:17:47.549737 systemd[1]: Started cri-containerd-d9d2ff8fa2b6bd81c19925abf56a537ceaf27e56aed7a49c53554a46c71fcba2.scope. Dec 13 14:17:47.565578 systemd[1]: Started cri-containerd-4b8d47c3fce4894bf501e7c26607f777fab8b4d87b27c3cdcd6b4605b948971a.scope. Dec 13 14:17:47.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.565000 audit: BPF prog-id=70 op=LOAD Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1676 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964636139313439633165353739393039626563613731373130663730 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1676 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964636139313439633165353739393039626563613731373130663730 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit: BPF prog-id=71 op=LOAD Dec 13 14:17:47.566000 audit[1788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1676 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964636139313439633165353739393039626563613731373130663730 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit: BPF prog-id=72 op=LOAD Dec 13 14:17:47.566000 audit[1788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1676 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964636139313439633165353739393039626563613731373130663730 Dec 13 14:17:47.566000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:17:47.566000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.566000 audit: BPF prog-id=73 op=LOAD Dec 13 14:17:47.566000 audit[1788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1676 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964636139313439633165353739393039626563613731373130663730 Dec 13 14:17:47.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.581000 audit: BPF prog-id=74 op=LOAD Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1677 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439643266663866613262366264383163313939323561626635366135 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1677 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439643266663866613262366264383163313939323561626635366135 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit: BPF prog-id=75 op=LOAD Dec 13 14:17:47.583000 audit[1819]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1677 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439643266663866613262366264383163313939323561626635366135 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit: BPF prog-id=76 op=LOAD Dec 13 14:17:47.583000 audit[1819]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1677 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439643266663866613262366264383163313939323561626635366135 Dec 13 14:17:47.583000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:17:47.583000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.583000 audit: BPF prog-id=77 op=LOAD Dec 13 14:17:47.583000 audit[1819]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1677 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439643266663866613262366264383163313939323561626635366135 Dec 13 14:17:47.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit: BPF prog-id=78 op=LOAD Dec 13 14:17:47.588000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1675 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462386434376333666365343839346266353031653763323636303766 Dec 13 14:17:47.588000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1675 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462386434376333666365343839346266353031653763323636303766 Dec 13 14:17:47.588000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.588000 audit: BPF prog-id=79 op=LOAD Dec 13 14:17:47.588000 audit[1814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1675 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462386434376333666365343839346266353031653763323636303766 Dec 13 14:17:47.589000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.589000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.589000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.589000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.589000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.589000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.589000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.589000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.589000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.589000 audit: BPF prog-id=80 op=LOAD Dec 13 14:17:47.589000 audit[1814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1675 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462386434376333666365343839346266353031653763323636303766 Dec 13 14:17:47.590000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:17:47.590000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:17:47.590000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.590000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.590000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.590000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.590000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.590000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.590000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.590000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.590000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.590000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:47.590000 audit: BPF prog-id=81 op=LOAD Dec 13 14:17:47.590000 audit[1814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1675 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:47.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462386434376333666365343839346266353031653763323636303766 Dec 13 14:17:47.592375 kubelet[1619]: W1213 14:17:47.590234 1619 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.118:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused Dec 13 14:17:47.592375 kubelet[1619]: E1213 14:17:47.590293 1619 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.118:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.118:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:17:47.597301 env[1222]: time="2024-12-13T14:17:47.594579037Z" level=info msg="StartContainer for \"9dca9149c1e579909beca71710f709ebe9325323160f0690448cdf1017ad075e\" returns successfully" Dec 13 14:17:47.609319 kubelet[1619]: W1213 14:17:47.609225 1619 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.118:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.118:6443: connect: connection refused Dec 13 14:17:47.609319 kubelet[1619]: E1213 14:17:47.609288 1619 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.118:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.118:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:17:47.660507 env[1222]: time="2024-12-13T14:17:47.660453517Z" level=info msg="StartContainer for \"4b8d47c3fce4894bf501e7c26607f777fab8b4d87b27c3cdcd6b4605b948971a\" returns successfully" Dec 13 14:17:47.660854 env[1222]: time="2024-12-13T14:17:47.660821917Z" level=info msg="StartContainer for \"d9d2ff8fa2b6bd81c19925abf56a537ceaf27e56aed7a49c53554a46c71fcba2\" returns successfully" Dec 13 14:17:48.025692 kubelet[1619]: I1213 14:17:48.025162 1619 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:17:48.442723 kubelet[1619]: E1213 14:17:48.442688 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:48.444712 kubelet[1619]: E1213 14:17:48.444685 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:48.446190 kubelet[1619]: E1213 14:17:48.446169 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:48.788000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:48.791972 kernel: kauditd_printk_skb: 561 callbacks suppressed Dec 13 14:17:48.792017 kernel: audit: type=1400 audit(1734099468.788:555): avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:48.792034 kernel: audit: type=1300 audit(1734099468.788:555): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40007c2000 a2=fc6 a3=0 items=0 ppid=1677 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 key=(null) Dec 13 14:17:48.788000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40007c2000 a2=fc6 a3=0 items=0 ppid=1677 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 key=(null) Dec 13 14:17:48.788000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:48.797061 kernel: audit: type=1327 audit(1734099468.788:555): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:48.797102 kernel: audit: type=1400 audit(1734099468.788:556): avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:48.788000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:48.788000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40007ba040 a2=fc6 a3=0 items=0 ppid=1677 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 key=(null) Dec 13 14:17:48.802303 kernel: audit: type=1300 audit(1734099468.788:556): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40007ba040 a2=fc6 a3=0 items=0 ppid=1677 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 key=(null) Dec 13 14:17:48.788000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:48.804771 kernel: audit: type=1327 audit(1734099468.788:556): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:49.448186 kubelet[1619]: E1213 14:17:49.448145 1619 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:49.471000 audit[1846]: AVC avc: denied { watch } for pid=1846 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:49.472000 audit[1846]: AVC avc: denied { watch } for pid=1846 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:49.477312 kernel: audit: type=1400 audit(1734099469.471:557): avc: denied { watch } for pid=1846 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:49.477347 kernel: audit: type=1400 audit(1734099469.472:558): avc: denied { watch } for pid=1846 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:49.477363 kernel: audit: type=1300 audit(1734099469.472:558): arch=c00000b7 syscall=27 success=no exit=-13 a0=44 a1=4006ff60c0 a2=fc6 a3=0 items=0 ppid=1675 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 key=(null) Dec 13 14:17:49.472000 audit[1846]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=44 a1=4006ff60c0 a2=fc6 a3=0 items=0 ppid=1675 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 key=(null) Dec 13 14:17:49.472000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:17:49.482422 kernel: audit: type=1327 audit(1734099469.472:558): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:17:49.472000 audit[1846]: AVC avc: denied { watch } for pid=1846 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7289 scontext=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:49.472000 audit[1846]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=43 a1=4004cc40c0 a2=fc6 a3=0 items=0 ppid=1675 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 key=(null) Dec 13 14:17:49.472000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:17:49.471000 audit[1846]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4006c43c20 a2=fc6 a3=0 items=0 ppid=1675 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 key=(null) Dec 13 14:17:49.471000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:17:49.481000 audit[1846]: AVC avc: denied { watch } for pid=1846 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:49.481000 audit[1846]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=4006c43d40 a2=fc6 a3=0 items=0 ppid=1675 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 key=(null) Dec 13 14:17:49.481000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:17:49.482000 audit[1846]: AVC avc: denied { watch } for pid=1846 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:49.482000 audit[1846]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=4006eb8640 a2=fc6 a3=0 items=0 ppid=1675 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 key=(null) Dec 13 14:17:49.482000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:17:49.482000 audit[1846]: AVC avc: denied { watch } for pid=1846 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:49.482000 audit[1846]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=4004600f90 a2=fc6 a3=0 items=0 ppid=1675 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 key=(null) Dec 13 14:17:49.482000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:17:49.527675 kubelet[1619]: E1213 14:17:49.527622 1619 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Dec 13 14:17:49.618738 kubelet[1619]: I1213 14:17:49.618687 1619 kubelet_node_status.go:75] "Successfully registered node" node="localhost" Dec 13 14:17:50.400350 kubelet[1619]: I1213 14:17:50.400112 1619 apiserver.go:52] "Watching apiserver" Dec 13 14:17:50.415006 kubelet[1619]: I1213 14:17:50.414940 1619 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:17:51.684838 systemd[1]: Reloading. Dec 13 14:17:51.746160 /usr/lib/systemd/system-generators/torcx-generator[1916]: time="2024-12-13T14:17:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:17:51.746184 /usr/lib/systemd/system-generators/torcx-generator[1916]: time="2024-12-13T14:17:51Z" level=info msg="torcx already run" Dec 13 14:17:51.800022 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:17:51.800220 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:17:51.815254 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:17:51.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.873000 audit: BPF prog-id=82 op=LOAD Dec 13 14:17:51.873000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:17:51.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.874000 audit: BPF prog-id=83 op=LOAD Dec 13 14:17:51.874000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:17:51.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.875000 audit: BPF prog-id=84 op=LOAD Dec 13 14:17:51.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.875000 audit: BPF prog-id=85 op=LOAD Dec 13 14:17:51.875000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:17:51.875000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:17:51.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.877000 audit: BPF prog-id=86 op=LOAD Dec 13 14:17:51.877000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:17:51.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.878000 audit: BPF prog-id=87 op=LOAD Dec 13 14:17:51.879000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:17:51.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.879000 audit: BPF prog-id=88 op=LOAD Dec 13 14:17:51.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.879000 audit: BPF prog-id=89 op=LOAD Dec 13 14:17:51.880000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:17:51.880000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:17:51.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.880000 audit: BPF prog-id=90 op=LOAD Dec 13 14:17:51.880000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:17:51.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.881000 audit: BPF prog-id=91 op=LOAD Dec 13 14:17:51.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.881000 audit: BPF prog-id=92 op=LOAD Dec 13 14:17:51.881000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:17:51.881000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:17:51.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.883000 audit: BPF prog-id=93 op=LOAD Dec 13 14:17:51.883000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:17:51.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.884000 audit: BPF prog-id=94 op=LOAD Dec 13 14:17:51.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.884000 audit: BPF prog-id=95 op=LOAD Dec 13 14:17:51.884000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:17:51.885000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:17:51.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.885000 audit: BPF prog-id=96 op=LOAD Dec 13 14:17:51.886000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:17:51.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.886000 audit: BPF prog-id=97 op=LOAD Dec 13 14:17:51.886000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:17:51.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.888000 audit: BPF prog-id=98 op=LOAD Dec 13 14:17:51.888000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:17:51.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.889000 audit: BPF prog-id=99 op=LOAD Dec 13 14:17:51.889000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:17:51.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.891000 audit: BPF prog-id=100 op=LOAD Dec 13 14:17:51.891000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:17:51.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.892000 audit: BPF prog-id=101 op=LOAD Dec 13 14:17:51.892000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:17:51.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:51.893000 audit: BPF prog-id=102 op=LOAD Dec 13 14:17:51.893000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:17:51.903519 systemd[1]: Stopping kubelet.service... Dec 13 14:17:51.930404 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:17:51.930633 systemd[1]: Stopped kubelet.service. Dec 13 14:17:51.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:51.930689 systemd[1]: kubelet.service: Consumed 1.524s CPU time. Dec 13 14:17:51.932822 systemd[1]: Starting kubelet.service... Dec 13 14:17:51.948000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:17:51.948000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40000ee5c0 a2=fc6 a3=0 items=0 ppid=1677 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 key=(null) Dec 13 14:17:51.948000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:52.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.018167 systemd[1]: Started kubelet.service. Dec 13 14:17:52.050925 kubelet[1957]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:17:52.050925 kubelet[1957]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:17:52.050925 kubelet[1957]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:17:52.051280 kubelet[1957]: I1213 14:17:52.050986 1957 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:17:52.056030 kubelet[1957]: I1213 14:17:52.055996 1957 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:17:52.056030 kubelet[1957]: I1213 14:17:52.056023 1957 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:17:52.056246 kubelet[1957]: I1213 14:17:52.056225 1957 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:17:52.057497 kubelet[1957]: I1213 14:17:52.057474 1957 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:17:52.059398 kubelet[1957]: I1213 14:17:52.059372 1957 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:17:52.062566 kubelet[1957]: E1213 14:17:52.062529 1957 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:17:52.062566 kubelet[1957]: I1213 14:17:52.062564 1957 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:17:52.065462 kubelet[1957]: I1213 14:17:52.065436 1957 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:17:52.065571 kubelet[1957]: I1213 14:17:52.065553 1957 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:17:52.065720 kubelet[1957]: I1213 14:17:52.065685 1957 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:17:52.066035 kubelet[1957]: I1213 14:17:52.065718 1957 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:17:52.066035 kubelet[1957]: I1213 14:17:52.065894 1957 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:17:52.066035 kubelet[1957]: I1213 14:17:52.065904 1957 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:17:52.066035 kubelet[1957]: I1213 14:17:52.065945 1957 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:17:52.067206 kubelet[1957]: I1213 14:17:52.067191 1957 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:17:52.067261 kubelet[1957]: I1213 14:17:52.067210 1957 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:17:52.067261 kubelet[1957]: I1213 14:17:52.067231 1957 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:17:52.067261 kubelet[1957]: I1213 14:17:52.067239 1957 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:17:52.068104 kubelet[1957]: I1213 14:17:52.068081 1957 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:17:52.068564 kubelet[1957]: I1213 14:17:52.068537 1957 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:17:52.068882 kubelet[1957]: I1213 14:17:52.068868 1957 server.go:1269] "Started kubelet" Dec 13 14:17:52.069445 kubelet[1957]: I1213 14:17:52.069390 1957 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:17:52.069731 kubelet[1957]: I1213 14:17:52.069712 1957 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:17:52.069863 kubelet[1957]: I1213 14:17:52.069843 1957 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:17:52.070210 kubelet[1957]: I1213 14:17:52.070181 1957 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:17:52.070284 kubelet[1957]: I1213 14:17:52.070219 1957 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:17:52.070284 kubelet[1957]: I1213 14:17:52.070240 1957 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:17:52.070924 kubelet[1957]: I1213 14:17:52.070902 1957 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:17:52.071764 kubelet[1957]: I1213 14:17:52.071720 1957 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:17:52.072076 kubelet[1957]: I1213 14:17:52.072054 1957 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:17:52.072076 kubelet[1957]: E1213 14:17:52.072065 1957 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:17:52.072181 kubelet[1957]: I1213 14:17:52.072172 1957 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:17:52.072322 kubelet[1957]: I1213 14:17:52.072296 1957 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:17:52.068000 audit[1957]: AVC avc: denied { mac_admin } for pid=1957 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:52.068000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:17:52.068000 audit[1957]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b13ce0 a1=4000b14f60 a2=4000b13cb0 a3=25 items=0 ppid=1 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:52.068000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:17:52.069000 audit[1957]: AVC avc: denied { mac_admin } for pid=1957 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:52.069000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:17:52.069000 audit[1957]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400099eb60 a1=4000b14f78 a2=4000b13d70 a3=25 items=0 ppid=1 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:52.069000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:17:52.078532 kubelet[1957]: I1213 14:17:52.078496 1957 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:17:52.079298 kubelet[1957]: I1213 14:17:52.079272 1957 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:17:52.079342 kubelet[1957]: I1213 14:17:52.079298 1957 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:17:52.079342 kubelet[1957]: I1213 14:17:52.079316 1957 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:17:52.079384 kubelet[1957]: E1213 14:17:52.079364 1957 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:17:52.082076 kubelet[1957]: I1213 14:17:52.082044 1957 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:17:52.082174 kubelet[1957]: I1213 14:17:52.082152 1957 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:17:52.096315 kubelet[1957]: I1213 14:17:52.096164 1957 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:17:52.098783 kubelet[1957]: E1213 14:17:52.098761 1957 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:17:52.130902 kubelet[1957]: I1213 14:17:52.130876 1957 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:17:52.130902 kubelet[1957]: I1213 14:17:52.130896 1957 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:17:52.130998 kubelet[1957]: I1213 14:17:52.130914 1957 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:17:52.131055 kubelet[1957]: I1213 14:17:52.131039 1957 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:17:52.131081 kubelet[1957]: I1213 14:17:52.131055 1957 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:17:52.131081 kubelet[1957]: I1213 14:17:52.131073 1957 policy_none.go:49] "None policy: Start" Dec 13 14:17:52.131666 kubelet[1957]: I1213 14:17:52.131651 1957 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:17:52.131711 kubelet[1957]: I1213 14:17:52.131674 1957 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:17:52.131809 kubelet[1957]: I1213 14:17:52.131797 1957 state_mem.go:75] "Updated machine memory state" Dec 13 14:17:52.135000 audit[1957]: AVC avc: denied { mac_admin } for pid=1957 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:52.135000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:17:52.135000 audit[1957]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000fc73e0 a1=40010099e0 a2=4000fc73b0 a3=25 items=0 ppid=1 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:52.135000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:17:52.137179 kubelet[1957]: I1213 14:17:52.136579 1957 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:17:52.137179 kubelet[1957]: I1213 14:17:52.136657 1957 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:17:52.137179 kubelet[1957]: I1213 14:17:52.136774 1957 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:17:52.137179 kubelet[1957]: I1213 14:17:52.136783 1957 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:17:52.138269 kubelet[1957]: I1213 14:17:52.137542 1957 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:17:52.239924 kubelet[1957]: I1213 14:17:52.239844 1957 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:17:52.261483 kubelet[1957]: I1213 14:17:52.261436 1957 kubelet_node_status.go:111] "Node was previously registered" node="localhost" Dec 13 14:17:52.261568 kubelet[1957]: I1213 14:17:52.261519 1957 kubelet_node_status.go:75] "Successfully registered node" node="localhost" Dec 13 14:17:52.273625 kubelet[1957]: I1213 14:17:52.273598 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:17:52.273752 kubelet[1957]: I1213 14:17:52.273733 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:17:52.273822 kubelet[1957]: I1213 14:17:52.273810 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a52b86ce975f496e6002ba953fa9b888-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"a52b86ce975f496e6002ba953fa9b888\") " pod="kube-system/kube-scheduler-localhost" Dec 13 14:17:52.273906 kubelet[1957]: I1213 14:17:52.273884 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f6ee7941e59b41ec1b8583aa84179840-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"f6ee7941e59b41ec1b8583aa84179840\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:17:52.274001 kubelet[1957]: I1213 14:17:52.273988 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f6ee7941e59b41ec1b8583aa84179840-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"f6ee7941e59b41ec1b8583aa84179840\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:17:52.274081 kubelet[1957]: I1213 14:17:52.274066 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f6ee7941e59b41ec1b8583aa84179840-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"f6ee7941e59b41ec1b8583aa84179840\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:17:52.274179 kubelet[1957]: I1213 14:17:52.274164 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:17:52.274258 kubelet[1957]: I1213 14:17:52.274245 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:17:52.274391 kubelet[1957]: I1213 14:17:52.274376 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:17:52.487102 kubelet[1957]: E1213 14:17:52.487061 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:52.488171 kubelet[1957]: E1213 14:17:52.488146 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:52.488294 kubelet[1957]: E1213 14:17:52.488152 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:53.067942 kubelet[1957]: I1213 14:17:53.067904 1957 apiserver.go:52] "Watching apiserver" Dec 13 14:17:53.072417 kubelet[1957]: I1213 14:17:53.072385 1957 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:17:53.114940 kubelet[1957]: E1213 14:17:53.114909 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:53.120700 kubelet[1957]: E1213 14:17:53.120675 1957 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Dec 13 14:17:53.120816 kubelet[1957]: E1213 14:17:53.120801 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:53.121172 kubelet[1957]: E1213 14:17:53.121151 1957 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Dec 13 14:17:53.121275 kubelet[1957]: E1213 14:17:53.121253 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:53.132309 kubelet[1957]: I1213 14:17:53.132244 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.1322319969999999 podStartE2EDuration="1.132231997s" podCreationTimestamp="2024-12-13 14:17:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:17:53.132113277 +0000 UTC m=+1.110575081" watchObservedRunningTime="2024-12-13 14:17:53.132231997 +0000 UTC m=+1.110693761" Dec 13 14:17:53.144213 kubelet[1957]: I1213 14:17:53.144170 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.144156957 podStartE2EDuration="1.144156957s" podCreationTimestamp="2024-12-13 14:17:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:17:53.138146037 +0000 UTC m=+1.116607801" watchObservedRunningTime="2024-12-13 14:17:53.144156957 +0000 UTC m=+1.122618721" Dec 13 14:17:53.235000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:53.235000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000bc6420 a2=fc6 a3=0 items=0 ppid=1677 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 key=(null) Dec 13 14:17:53.235000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:53.236000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:53.236000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40007ba920 a2=fc6 a3=0 items=0 ppid=1677 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 key=(null) Dec 13 14:17:53.236000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:53.237000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:53.237000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40007ba960 a2=fc6 a3=0 items=0 ppid=1677 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 key=(null) Dec 13 14:17:53.237000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:53.237000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:53.237000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40007ba9a0 a2=fc6 a3=0 items=0 ppid=1677 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 key=(null) Dec 13 14:17:53.237000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:54.115892 kubelet[1957]: E1213 14:17:54.115848 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:54.116389 kubelet[1957]: E1213 14:17:54.116360 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:55.117531 kubelet[1957]: E1213 14:17:55.117504 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:56.651214 kubelet[1957]: I1213 14:17:56.651180 1957 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:17:56.651621 env[1222]: time="2024-12-13T14:17:56.651544881Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:17:56.651794 kubelet[1957]: I1213 14:17:56.651711 1957 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:17:56.780954 sudo[1360]: pam_unix(sudo:session): session closed for user root Dec 13 14:17:56.780000 audit[1360]: USER_END pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:56.783902 kernel: kauditd_printk_skb: 287 callbacks suppressed Dec 13 14:17:56.783987 kernel: audit: type=1106 audit(1734099476.780:817): pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:56.784010 kernel: audit: type=1104 audit(1734099476.780:818): pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:56.780000 audit[1360]: CRED_DISP pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:17:56.786630 sshd[1355]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:56.786000 audit[1355]: USER_END pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:17:56.789000 audit[1355]: CRED_DISP pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:17:56.793042 kernel: audit: type=1106 audit(1734099476.786:819): pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:17:56.793103 kernel: audit: type=1104 audit(1734099476.789:820): pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:17:56.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.118:22-10.0.0.1:54384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:56.794418 systemd[1]: sshd@6-10.0.0.118:22-10.0.0.1:54384.service: Deactivated successfully. Dec 13 14:17:56.795116 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:17:56.795298 systemd[1]: session-7.scope: Consumed 7.296s CPU time. Dec 13 14:17:56.797525 kernel: audit: type=1131 audit(1734099476.793:821): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.118:22-10.0.0.1:54384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:56.797241 systemd-logind[1210]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:17:56.797917 systemd-logind[1210]: Removed session 7. Dec 13 14:17:57.550497 kubelet[1957]: I1213 14:17:57.550418 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=5.5503953710000005 podStartE2EDuration="5.550395371s" podCreationTimestamp="2024-12-13 14:17:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:17:53.144676557 +0000 UTC m=+1.123138321" watchObservedRunningTime="2024-12-13 14:17:57.550395371 +0000 UTC m=+5.528857135" Dec 13 14:17:57.555851 systemd[1]: Created slice kubepods-besteffort-pod8ddd62af_64cb_4e6e_a13a_acbb52142e65.slice. Dec 13 14:17:57.614049 kubelet[1957]: I1213 14:17:57.613994 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/8ddd62af-64cb-4e6e-a13a-acbb52142e65-kube-proxy\") pod \"kube-proxy-2gmnb\" (UID: \"8ddd62af-64cb-4e6e-a13a-acbb52142e65\") " pod="kube-system/kube-proxy-2gmnb" Dec 13 14:17:57.614049 kubelet[1957]: I1213 14:17:57.614040 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8ddd62af-64cb-4e6e-a13a-acbb52142e65-xtables-lock\") pod \"kube-proxy-2gmnb\" (UID: \"8ddd62af-64cb-4e6e-a13a-acbb52142e65\") " pod="kube-system/kube-proxy-2gmnb" Dec 13 14:17:57.614247 kubelet[1957]: I1213 14:17:57.614104 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8ddd62af-64cb-4e6e-a13a-acbb52142e65-lib-modules\") pod \"kube-proxy-2gmnb\" (UID: \"8ddd62af-64cb-4e6e-a13a-acbb52142e65\") " pod="kube-system/kube-proxy-2gmnb" Dec 13 14:17:57.614247 kubelet[1957]: I1213 14:17:57.614152 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dhvwx\" (UniqueName: \"kubernetes.io/projected/8ddd62af-64cb-4e6e-a13a-acbb52142e65-kube-api-access-dhvwx\") pod \"kube-proxy-2gmnb\" (UID: \"8ddd62af-64cb-4e6e-a13a-acbb52142e65\") " pod="kube-system/kube-proxy-2gmnb" Dec 13 14:17:57.687509 systemd[1]: Created slice kubepods-besteffort-pod103e10e5_2a0d_4899_bb2e_01c095d6f70c.slice. Dec 13 14:17:57.715093 kubelet[1957]: I1213 14:17:57.715037 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4sffr\" (UniqueName: \"kubernetes.io/projected/103e10e5-2a0d-4899-bb2e-01c095d6f70c-kube-api-access-4sffr\") pod \"tigera-operator-76c4976dd7-pnm4t\" (UID: \"103e10e5-2a0d-4899-bb2e-01c095d6f70c\") " pod="tigera-operator/tigera-operator-76c4976dd7-pnm4t" Dec 13 14:17:57.715493 kubelet[1957]: I1213 14:17:57.715149 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/103e10e5-2a0d-4899-bb2e-01c095d6f70c-var-lib-calico\") pod \"tigera-operator-76c4976dd7-pnm4t\" (UID: \"103e10e5-2a0d-4899-bb2e-01c095d6f70c\") " pod="tigera-operator/tigera-operator-76c4976dd7-pnm4t" Dec 13 14:17:57.722786 kubelet[1957]: I1213 14:17:57.722749 1957 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 14:17:57.864772 kubelet[1957]: E1213 14:17:57.864619 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:57.865354 env[1222]: time="2024-12-13T14:17:57.865316017Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2gmnb,Uid:8ddd62af-64cb-4e6e-a13a-acbb52142e65,Namespace:kube-system,Attempt:0,}" Dec 13 14:17:57.879229 env[1222]: time="2024-12-13T14:17:57.879149205Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:57.879229 env[1222]: time="2024-12-13T14:17:57.879193966Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:57.879229 env[1222]: time="2024-12-13T14:17:57.879210886Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:57.879469 env[1222]: time="2024-12-13T14:17:57.879427326Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/80c85fb5380ebecae2a5357c5c4a844977cca852cc1e7e7ca188003e1fb93ff2 pid=2055 runtime=io.containerd.runc.v2 Dec 13 14:17:57.895495 systemd[1]: Started cri-containerd-80c85fb5380ebecae2a5357c5c4a844977cca852cc1e7e7ca188003e1fb93ff2.scope. Dec 13 14:17:57.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.922150 kernel: audit: type=1400 audit(1734099477.917:822): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.922194 kernel: audit: type=1400 audit(1734099477.917:823): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.922216 kernel: audit: type=1400 audit(1734099477.917:824): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.925723 kernel: audit: type=1400 audit(1734099477.917:825): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.925773 kernel: audit: type=1400 audit(1734099477.917:826): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.919000 audit: BPF prog-id=103 op=LOAD Dec 13 14:17:57.922000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.922000 audit[2066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2055 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:57.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830633835666235333830656265636165326135333537633563346138 Dec 13 14:17:57.923000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.923000 audit[2066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2055 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:57.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830633835666235333830656265636165326135333537633563346138 Dec 13 14:17:57.923000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.923000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.923000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.923000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.923000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.923000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.923000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.923000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.923000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.923000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.923000 audit: BPF prog-id=104 op=LOAD Dec 13 14:17:57.923000 audit[2066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2055 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:57.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830633835666235333830656265636165326135333537633563346138 Dec 13 14:17:57.924000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.924000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.924000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.924000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.924000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.924000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.924000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.924000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.924000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.924000 audit: BPF prog-id=105 op=LOAD Dec 13 14:17:57.924000 audit[2066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2055 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:57.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830633835666235333830656265636165326135333537633563346138 Dec 13 14:17:57.926000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:17:57.926000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:17:57.926000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.926000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.926000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.926000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.926000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.926000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.926000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.926000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.926000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.926000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.926000 audit: BPF prog-id=106 op=LOAD Dec 13 14:17:57.926000 audit[2066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2055 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:57.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830633835666235333830656265636165326135333537633563346138 Dec 13 14:17:57.938535 env[1222]: time="2024-12-13T14:17:57.938499087Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2gmnb,Uid:8ddd62af-64cb-4e6e-a13a-acbb52142e65,Namespace:kube-system,Attempt:0,} returns sandbox id \"80c85fb5380ebecae2a5357c5c4a844977cca852cc1e7e7ca188003e1fb93ff2\"" Dec 13 14:17:57.939429 kubelet[1957]: E1213 14:17:57.939396 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:57.941813 env[1222]: time="2024-12-13T14:17:57.941771254Z" level=info msg="CreateContainer within sandbox \"80c85fb5380ebecae2a5357c5c4a844977cca852cc1e7e7ca188003e1fb93ff2\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:17:57.955638 env[1222]: time="2024-12-13T14:17:57.955574202Z" level=info msg="CreateContainer within sandbox \"80c85fb5380ebecae2a5357c5c4a844977cca852cc1e7e7ca188003e1fb93ff2\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"0a2cf48a35f371a7c5385fe4a4f53a9d0755ec4d74f9fc9f7b3e9e8ddbfaa850\"" Dec 13 14:17:57.956517 env[1222]: time="2024-12-13T14:17:57.956483164Z" level=info msg="StartContainer for \"0a2cf48a35f371a7c5385fe4a4f53a9d0755ec4d74f9fc9f7b3e9e8ddbfaa850\"" Dec 13 14:17:57.971485 systemd[1]: Started cri-containerd-0a2cf48a35f371a7c5385fe4a4f53a9d0755ec4d74f9fc9f7b3e9e8ddbfaa850.scope. Dec 13 14:17:57.991001 env[1222]: time="2024-12-13T14:17:57.990954155Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-pnm4t,Uid:103e10e5-2a0d-4899-bb2e-01c095d6f70c,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:17:57.994000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.994000 audit[2097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2055 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:57.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061326366343861333566333731613763353338356665346134663533 Dec 13 14:17:57.994000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.994000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.994000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.994000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.994000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.994000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.994000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.994000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.994000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.994000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.994000 audit: BPF prog-id=107 op=LOAD Dec 13 14:17:57.994000 audit[2097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2055 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:57.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061326366343861333566333731613763353338356665346134663533 Dec 13 14:17:57.995000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.995000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.995000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.995000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.995000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.995000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.995000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.995000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.995000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.995000 audit: BPF prog-id=108 op=LOAD Dec 13 14:17:57.995000 audit[2097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2055 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:57.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061326366343861333566333731613763353338356665346134663533 Dec 13 14:17:57.996000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:17:57.996000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:17:57.996000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.996000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.996000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.996000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.996000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.996000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.996000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.996000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.996000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.996000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:57.996000 audit: BPF prog-id=109 op=LOAD Dec 13 14:17:57.996000 audit[2097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2055 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:57.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061326366343861333566333731613763353338356665346134663533 Dec 13 14:17:58.008018 env[1222]: time="2024-12-13T14:17:58.007919109Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:17:58.008018 env[1222]: time="2024-12-13T14:17:58.007978629Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:17:58.008018 env[1222]: time="2024-12-13T14:17:58.007989269Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:17:58.011222 env[1222]: time="2024-12-13T14:17:58.009704152Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dc0725e528c0c5635483f3967e90f6181730182f2b40285f110eaae8a32743be pid=2129 runtime=io.containerd.runc.v2 Dec 13 14:17:58.013383 env[1222]: time="2024-12-13T14:17:58.013337079Z" level=info msg="StartContainer for \"0a2cf48a35f371a7c5385fe4a4f53a9d0755ec4d74f9fc9f7b3e9e8ddbfaa850\" returns successfully" Dec 13 14:17:58.030719 systemd[1]: Started cri-containerd-dc0725e528c0c5635483f3967e90f6181730182f2b40285f110eaae8a32743be.scope. Dec 13 14:17:58.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.064000 audit: BPF prog-id=110 op=LOAD Dec 13 14:17:58.064000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.064000 audit[2139]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2129 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463303732356535323863306335363335343833663339363765393066 Dec 13 14:17:58.064000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.064000 audit[2139]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2129 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463303732356535323863306335363335343833663339363765393066 Dec 13 14:17:58.065000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.065000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.065000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.065000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.065000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.065000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.065000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.065000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.065000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.065000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.065000 audit: BPF prog-id=111 op=LOAD Dec 13 14:17:58.065000 audit[2139]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2129 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463303732356535323863306335363335343833663339363765393066 Dec 13 14:17:58.065000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.065000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.065000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.065000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.065000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.065000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.065000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.065000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.065000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.065000 audit: BPF prog-id=112 op=LOAD Dec 13 14:17:58.065000 audit[2139]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2129 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.065000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463303732356535323863306335363335343833663339363765393066 Dec 13 14:17:58.067000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:17:58.068000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:17:58.068000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.068000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.068000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.068000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.068000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.068000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.068000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.068000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.068000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.068000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:58.068000 audit: BPF prog-id=113 op=LOAD Dec 13 14:17:58.068000 audit[2139]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2129 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463303732356535323863306335363335343833663339363765393066 Dec 13 14:17:58.092452 env[1222]: time="2024-12-13T14:17:58.092395751Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-pnm4t,Uid:103e10e5-2a0d-4899-bb2e-01c095d6f70c,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"dc0725e528c0c5635483f3967e90f6181730182f2b40285f110eaae8a32743be\"" Dec 13 14:17:58.093936 env[1222]: time="2024-12-13T14:17:58.093817314Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:17:58.130691 kubelet[1957]: E1213 14:17:58.127209 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:17:58.141805 kubelet[1957]: I1213 14:17:58.141719 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-2gmnb" podStartSLOduration=1.141702126 podStartE2EDuration="1.141702126s" podCreationTimestamp="2024-12-13 14:17:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:17:58.141667366 +0000 UTC m=+6.120129130" watchObservedRunningTime="2024-12-13 14:17:58.141702126 +0000 UTC m=+6.120163850" Dec 13 14:17:58.223000 audit[2200]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.223000 audit[2200]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe6713fb0 a2=0 a3=1 items=0 ppid=2108 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:17:58.223000 audit[2199]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.223000 audit[2199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdf917270 a2=0 a3=1 items=0 ppid=2108 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.223000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:17:58.224000 audit[2201]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.224000 audit[2201]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd91742e0 a2=0 a3=1 items=0 ppid=2108 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.224000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:17:58.225000 audit[2203]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.225000 audit[2203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffded54030 a2=0 a3=1 items=0 ppid=2108 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.225000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:17:58.227000 audit[2202]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.227000 audit[2202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc0720510 a2=0 a3=1 items=0 ppid=2108 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.227000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:17:58.228000 audit[2204]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.228000 audit[2204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffddda1550 a2=0 a3=1 items=0 ppid=2108 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:17:58.326000 audit[2205]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.326000 audit[2205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffed366de0 a2=0 a3=1 items=0 ppid=2108 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.326000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:17:58.328000 audit[2207]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.328000 audit[2207]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff708e2e0 a2=0 a3=1 items=0 ppid=2108 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.328000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:17:58.333000 audit[2210]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.333000 audit[2210]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffdbc18c10 a2=0 a3=1 items=0 ppid=2108 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:17:58.334000 audit[2211]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.334000 audit[2211]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff7f21e0 a2=0 a3=1 items=0 ppid=2108 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.334000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:17:58.337000 audit[2213]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.337000 audit[2213]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe022b320 a2=0 a3=1 items=0 ppid=2108 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.337000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:17:58.338000 audit[2214]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.338000 audit[2214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd5617e30 a2=0 a3=1 items=0 ppid=2108 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.338000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:17:58.340000 audit[2216]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.340000 audit[2216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffea5d3ac0 a2=0 a3=1 items=0 ppid=2108 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.340000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:17:58.343000 audit[2219]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.343000 audit[2219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffe32e380 a2=0 a3=1 items=0 ppid=2108 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:17:58.344000 audit[2220]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.344000 audit[2220]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff71fe650 a2=0 a3=1 items=0 ppid=2108 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.344000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:17:58.347000 audit[2222]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.347000 audit[2222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffeeccdde0 a2=0 a3=1 items=0 ppid=2108 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.347000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:17:58.348000 audit[2223]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.348000 audit[2223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffffe96960 a2=0 a3=1 items=0 ppid=2108 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.348000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:17:58.350000 audit[2225]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.350000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffedfcfc30 a2=0 a3=1 items=0 ppid=2108 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:17:58.353000 audit[2228]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.353000 audit[2228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe7567600 a2=0 a3=1 items=0 ppid=2108 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.353000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:17:58.356000 audit[2231]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.356000 audit[2231]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd2e12930 a2=0 a3=1 items=0 ppid=2108 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:17:58.357000 audit[2232]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.357000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff85eceb0 a2=0 a3=1 items=0 ppid=2108 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.357000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:17:58.359000 audit[2234]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.359000 audit[2234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffd152c370 a2=0 a3=1 items=0 ppid=2108 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:17:58.362000 audit[2237]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.362000 audit[2237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc3757e40 a2=0 a3=1 items=0 ppid=2108 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.362000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:17:58.364000 audit[2238]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.364000 audit[2238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff6d09e40 a2=0 a3=1 items=0 ppid=2108 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:17:58.366000 audit[2240]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:17:58.366000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffea4a03a0 a2=0 a3=1 items=0 ppid=2108 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.366000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:17:58.389000 audit[2246]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:58.389000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffce1e8570 a2=0 a3=1 items=0 ppid=2108 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.389000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:58.406000 audit[2246]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:17:58.406000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffce1e8570 a2=0 a3=1 items=0 ppid=2108 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.406000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:58.408000 audit[2251]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.408000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffff961d40 a2=0 a3=1 items=0 ppid=2108 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.408000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:17:58.410000 audit[2253]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.410000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe270b0a0 a2=0 a3=1 items=0 ppid=2108 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:17:58.413000 audit[2256]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.413000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd1026d30 a2=0 a3=1 items=0 ppid=2108 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.413000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:17:58.415000 audit[2257]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.415000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff3be1040 a2=0 a3=1 items=0 ppid=2108 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.415000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:17:58.417000 audit[2259]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.417000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffddee5b0 a2=0 a3=1 items=0 ppid=2108 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.417000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:17:58.418000 audit[2260]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.418000 audit[2260]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffed2707f0 a2=0 a3=1 items=0 ppid=2108 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.418000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:17:58.421000 audit[2262]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.421000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff8a285b0 a2=0 a3=1 items=0 ppid=2108 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.421000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:17:58.424000 audit[2265]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.424000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffd7487310 a2=0 a3=1 items=0 ppid=2108 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.424000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:17:58.425000 audit[2266]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.425000 audit[2266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffed48b990 a2=0 a3=1 items=0 ppid=2108 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:17:58.428000 audit[2268]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.428000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc88246f0 a2=0 a3=1 items=0 ppid=2108 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:17:58.429000 audit[2269]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.429000 audit[2269]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc7f85d70 a2=0 a3=1 items=0 ppid=2108 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.429000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:17:58.431000 audit[2271]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.431000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc3cdf010 a2=0 a3=1 items=0 ppid=2108 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.431000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:17:58.434000 audit[2274]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.434000 audit[2274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd5fe4a90 a2=0 a3=1 items=0 ppid=2108 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.434000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:17:58.439000 audit[2277]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.439000 audit[2277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdfac07d0 a2=0 a3=1 items=0 ppid=2108 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:17:58.440000 audit[2278]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.440000 audit[2278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffec7c6910 a2=0 a3=1 items=0 ppid=2108 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.440000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:17:58.442000 audit[2280]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.442000 audit[2280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffdf3a0370 a2=0 a3=1 items=0 ppid=2108 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.442000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:17:58.446000 audit[2283]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.446000 audit[2283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff288c8b0 a2=0 a3=1 items=0 ppid=2108 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.446000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:17:58.447000 audit[2284]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.447000 audit[2284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe3430140 a2=0 a3=1 items=0 ppid=2108 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:17:58.448000 audit[2286]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.448000 audit[2286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe9bbafa0 a2=0 a3=1 items=0 ppid=2108 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.448000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:17:58.451000 audit[2287]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.451000 audit[2287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc5a9db40 a2=0 a3=1 items=0 ppid=2108 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.451000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:17:58.453000 audit[2289]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.453000 audit[2289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe26e8c90 a2=0 a3=1 items=0 ppid=2108 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.453000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:17:58.456000 audit[2292]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:17:58.456000 audit[2292]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe47cfa70 a2=0 a3=1 items=0 ppid=2108 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.456000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:17:58.459000 audit[2294]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:17:58.459000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffe8dd21d0 a2=0 a3=1 items=0 ppid=2108 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.459000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:17:58.460000 audit[2294]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:17:58.460000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffe8dd21d0 a2=0 a3=1 items=0 ppid=2108 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:58.460000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:00.001322 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3547274966.mount: Deactivated successfully. Dec 13 14:18:00.567028 env[1222]: time="2024-12-13T14:18:00.566975936Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:00.568570 env[1222]: time="2024-12-13T14:18:00.568542019Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:30d521e4e84764b396aacbb2a373ca7a573f84571e3955b34329652acccfb73c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:00.570651 env[1222]: time="2024-12-13T14:18:00.570617702Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:00.572064 env[1222]: time="2024-12-13T14:18:00.572023824Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:00.572665 env[1222]: time="2024-12-13T14:18:00.572639785Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:30d521e4e84764b396aacbb2a373ca7a573f84571e3955b34329652acccfb73c\"" Dec 13 14:18:00.575018 env[1222]: time="2024-12-13T14:18:00.574985829Z" level=info msg="CreateContainer within sandbox \"dc0725e528c0c5635483f3967e90f6181730182f2b40285f110eaae8a32743be\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:18:00.584605 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount693316408.mount: Deactivated successfully. Dec 13 14:18:00.586021 env[1222]: time="2024-12-13T14:18:00.585982368Z" level=info msg="CreateContainer within sandbox \"dc0725e528c0c5635483f3967e90f6181730182f2b40285f110eaae8a32743be\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"673ab4fac4ffdad8446af1b6ca53b9b3849a8f5f45b463bd96d14cfea52a0fce\"" Dec 13 14:18:00.587609 env[1222]: time="2024-12-13T14:18:00.586496289Z" level=info msg="StartContainer for \"673ab4fac4ffdad8446af1b6ca53b9b3849a8f5f45b463bd96d14cfea52a0fce\"" Dec 13 14:18:00.610761 systemd[1]: Started cri-containerd-673ab4fac4ffdad8446af1b6ca53b9b3849a8f5f45b463bd96d14cfea52a0fce.scope. Dec 13 14:18:00.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.631000 audit: BPF prog-id=114 op=LOAD Dec 13 14:18:00.631000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.631000 audit[2302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2129 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:00.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637336162346661633466666461643834343661663162366361353362 Dec 13 14:18:00.631000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.631000 audit[2302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2129 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:00.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637336162346661633466666461643834343661663162366361353362 Dec 13 14:18:00.632000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.632000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.632000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.632000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.632000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.632000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.632000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.632000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.632000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.632000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.632000 audit: BPF prog-id=115 op=LOAD Dec 13 14:18:00.632000 audit[2302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2129 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:00.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637336162346661633466666461643834343661663162366361353362 Dec 13 14:18:00.632000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.632000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.632000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.632000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.632000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.632000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.632000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.632000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.632000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.632000 audit: BPF prog-id=116 op=LOAD Dec 13 14:18:00.632000 audit[2302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2129 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:00.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637336162346661633466666461643834343661663162366361353362 Dec 13 14:18:00.633000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:18:00.633000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:18:00.633000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.633000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.633000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.633000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.633000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.633000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.633000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.633000 audit[2302]: AVC avc: denied { perfmon } for pid=2302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.633000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.633000 audit[2302]: AVC avc: denied { bpf } for pid=2302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:00.633000 audit: BPF prog-id=117 op=LOAD Dec 13 14:18:00.633000 audit[2302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2129 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:00.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637336162346661633466666461643834343661663162366361353362 Dec 13 14:18:00.650904 env[1222]: time="2024-12-13T14:18:00.650721397Z" level=info msg="StartContainer for \"673ab4fac4ffdad8446af1b6ca53b9b3849a8f5f45b463bd96d14cfea52a0fce\" returns successfully" Dec 13 14:18:00.667732 kubelet[1957]: E1213 14:18:00.666736 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:01.132696 kubelet[1957]: E1213 14:18:01.132657 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:02.362098 kubelet[1957]: E1213 14:18:02.362062 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:02.376394 kubelet[1957]: I1213 14:18:02.376347 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4976dd7-pnm4t" podStartSLOduration=2.896345297 podStartE2EDuration="5.376334571s" podCreationTimestamp="2024-12-13 14:17:57 +0000 UTC" firstStartedPulling="2024-12-13 14:17:58.093455233 +0000 UTC m=+6.071916997" lastFinishedPulling="2024-12-13 14:18:00.573444507 +0000 UTC m=+8.551906271" observedRunningTime="2024-12-13 14:18:01.148346143 +0000 UTC m=+9.126807907" watchObservedRunningTime="2024-12-13 14:18:02.376334571 +0000 UTC m=+10.354796335" Dec 13 14:18:03.135087 kubelet[1957]: E1213 14:18:03.135045 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:04.081000 audit[2336]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:04.083426 kernel: kauditd_printk_skb: 362 callbacks suppressed Dec 13 14:18:04.083485 kernel: audit: type=1325 audit(1734099484.081:933): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:04.081000 audit[2336]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd83f6ea0 a2=0 a3=1 items=0 ppid=2108 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.087911 kernel: audit: type=1300 audit(1734099484.081:933): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd83f6ea0 a2=0 a3=1 items=0 ppid=2108 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.087978 kernel: audit: type=1327 audit(1734099484.081:933): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:04.081000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:04.092000 audit[2336]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:04.092000 audit[2336]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd83f6ea0 a2=0 a3=1 items=0 ppid=2108 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.098647 kernel: audit: type=1325 audit(1734099484.092:934): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:04.098725 kernel: audit: type=1300 audit(1734099484.092:934): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd83f6ea0 a2=0 a3=1 items=0 ppid=2108 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.098752 kernel: audit: type=1327 audit(1734099484.092:934): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:04.092000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:04.106000 audit[2338]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:04.106000 audit[2338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd55bbf20 a2=0 a3=1 items=0 ppid=2108 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.112676 kernel: audit: type=1325 audit(1734099484.106:935): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:04.112737 kernel: audit: type=1300 audit(1734099484.106:935): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd55bbf20 a2=0 a3=1 items=0 ppid=2108 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.112759 kernel: audit: type=1327 audit(1734099484.106:935): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:04.106000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:04.118000 audit[2338]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:04.118000 audit[2338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd55bbf20 a2=0 a3=1 items=0 ppid=2108 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.121164 kernel: audit: type=1325 audit(1734099484.118:936): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:04.118000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:04.310623 systemd[1]: Created slice kubepods-besteffort-pod2957de9a_f53c_40b5_ad44_899fd63b09aa.slice. Dec 13 14:18:04.365496 kubelet[1957]: I1213 14:18:04.365344 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/2957de9a-f53c-40b5-ad44-899fd63b09aa-typha-certs\") pod \"calico-typha-6f5474f46d-42bp5\" (UID: \"2957de9a-f53c-40b5-ad44-899fd63b09aa\") " pod="calico-system/calico-typha-6f5474f46d-42bp5" Dec 13 14:18:04.365496 kubelet[1957]: I1213 14:18:04.365393 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v2ps5\" (UniqueName: \"kubernetes.io/projected/2957de9a-f53c-40b5-ad44-899fd63b09aa-kube-api-access-v2ps5\") pod \"calico-typha-6f5474f46d-42bp5\" (UID: \"2957de9a-f53c-40b5-ad44-899fd63b09aa\") " pod="calico-system/calico-typha-6f5474f46d-42bp5" Dec 13 14:18:04.365496 kubelet[1957]: I1213 14:18:04.365427 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2957de9a-f53c-40b5-ad44-899fd63b09aa-tigera-ca-bundle\") pod \"calico-typha-6f5474f46d-42bp5\" (UID: \"2957de9a-f53c-40b5-ad44-899fd63b09aa\") " pod="calico-system/calico-typha-6f5474f46d-42bp5" Dec 13 14:18:04.370745 systemd[1]: Created slice kubepods-besteffort-pod2871946f_2d9e_4233_8d80_36032a627d2f.slice. Dec 13 14:18:04.459742 kubelet[1957]: E1213 14:18:04.459707 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:04.466524 kubelet[1957]: I1213 14:18:04.466472 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/2871946f-2d9e-4233-8d80-36032a627d2f-cni-bin-dir\") pod \"calico-node-c8gsw\" (UID: \"2871946f-2d9e-4233-8d80-36032a627d2f\") " pod="calico-system/calico-node-c8gsw" Dec 13 14:18:04.466665 kubelet[1957]: I1213 14:18:04.466534 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2871946f-2d9e-4233-8d80-36032a627d2f-lib-modules\") pod \"calico-node-c8gsw\" (UID: \"2871946f-2d9e-4233-8d80-36032a627d2f\") " pod="calico-system/calico-node-c8gsw" Dec 13 14:18:04.466665 kubelet[1957]: I1213 14:18:04.466553 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/2871946f-2d9e-4233-8d80-36032a627d2f-policysync\") pod \"calico-node-c8gsw\" (UID: \"2871946f-2d9e-4233-8d80-36032a627d2f\") " pod="calico-system/calico-node-c8gsw" Dec 13 14:18:04.466665 kubelet[1957]: I1213 14:18:04.466580 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/2871946f-2d9e-4233-8d80-36032a627d2f-node-certs\") pod \"calico-node-c8gsw\" (UID: \"2871946f-2d9e-4233-8d80-36032a627d2f\") " pod="calico-system/calico-node-c8gsw" Dec 13 14:18:04.466665 kubelet[1957]: I1213 14:18:04.466606 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2871946f-2d9e-4233-8d80-36032a627d2f-xtables-lock\") pod \"calico-node-c8gsw\" (UID: \"2871946f-2d9e-4233-8d80-36032a627d2f\") " pod="calico-system/calico-node-c8gsw" Dec 13 14:18:04.466665 kubelet[1957]: I1213 14:18:04.466621 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/2871946f-2d9e-4233-8d80-36032a627d2f-cni-net-dir\") pod \"calico-node-c8gsw\" (UID: \"2871946f-2d9e-4233-8d80-36032a627d2f\") " pod="calico-system/calico-node-c8gsw" Dec 13 14:18:04.466791 kubelet[1957]: I1213 14:18:04.466637 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dhltx\" (UniqueName: \"kubernetes.io/projected/2871946f-2d9e-4233-8d80-36032a627d2f-kube-api-access-dhltx\") pod \"calico-node-c8gsw\" (UID: \"2871946f-2d9e-4233-8d80-36032a627d2f\") " pod="calico-system/calico-node-c8gsw" Dec 13 14:18:04.466791 kubelet[1957]: I1213 14:18:04.466656 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2871946f-2d9e-4233-8d80-36032a627d2f-tigera-ca-bundle\") pod \"calico-node-c8gsw\" (UID: \"2871946f-2d9e-4233-8d80-36032a627d2f\") " pod="calico-system/calico-node-c8gsw" Dec 13 14:18:04.466791 kubelet[1957]: I1213 14:18:04.466671 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/2871946f-2d9e-4233-8d80-36032a627d2f-var-run-calico\") pod \"calico-node-c8gsw\" (UID: \"2871946f-2d9e-4233-8d80-36032a627d2f\") " pod="calico-system/calico-node-c8gsw" Dec 13 14:18:04.466791 kubelet[1957]: I1213 14:18:04.466687 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/2871946f-2d9e-4233-8d80-36032a627d2f-cni-log-dir\") pod \"calico-node-c8gsw\" (UID: \"2871946f-2d9e-4233-8d80-36032a627d2f\") " pod="calico-system/calico-node-c8gsw" Dec 13 14:18:04.466791 kubelet[1957]: I1213 14:18:04.466708 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/2871946f-2d9e-4233-8d80-36032a627d2f-flexvol-driver-host\") pod \"calico-node-c8gsw\" (UID: \"2871946f-2d9e-4233-8d80-36032a627d2f\") " pod="calico-system/calico-node-c8gsw" Dec 13 14:18:04.466906 kubelet[1957]: I1213 14:18:04.466724 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2871946f-2d9e-4233-8d80-36032a627d2f-var-lib-calico\") pod \"calico-node-c8gsw\" (UID: \"2871946f-2d9e-4233-8d80-36032a627d2f\") " pod="calico-system/calico-node-c8gsw" Dec 13 14:18:04.489271 kubelet[1957]: E1213 14:18:04.489220 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5llpq" podUID="29bb0d43-5e2c-4f1d-91bc-dc52da9da965" Dec 13 14:18:04.567096 kubelet[1957]: I1213 14:18:04.567054 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/29bb0d43-5e2c-4f1d-91bc-dc52da9da965-varrun\") pod \"csi-node-driver-5llpq\" (UID: \"29bb0d43-5e2c-4f1d-91bc-dc52da9da965\") " pod="calico-system/csi-node-driver-5llpq" Dec 13 14:18:04.568791 kubelet[1957]: E1213 14:18:04.568766 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.568791 kubelet[1957]: W1213 14:18:04.568785 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.568922 kubelet[1957]: E1213 14:18:04.568815 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.569167 kubelet[1957]: E1213 14:18:04.569151 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.569211 kubelet[1957]: W1213 14:18:04.569193 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.569211 kubelet[1957]: E1213 14:18:04.569208 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.569293 kubelet[1957]: I1213 14:18:04.569235 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/29bb0d43-5e2c-4f1d-91bc-dc52da9da965-registration-dir\") pod \"csi-node-driver-5llpq\" (UID: \"29bb0d43-5e2c-4f1d-91bc-dc52da9da965\") " pod="calico-system/csi-node-driver-5llpq" Dec 13 14:18:04.572285 kubelet[1957]: E1213 14:18:04.569576 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.572285 kubelet[1957]: W1213 14:18:04.569592 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.572285 kubelet[1957]: E1213 14:18:04.569651 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.572285 kubelet[1957]: I1213 14:18:04.569672 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7j6zl\" (UniqueName: \"kubernetes.io/projected/29bb0d43-5e2c-4f1d-91bc-dc52da9da965-kube-api-access-7j6zl\") pod \"csi-node-driver-5llpq\" (UID: \"29bb0d43-5e2c-4f1d-91bc-dc52da9da965\") " pod="calico-system/csi-node-driver-5llpq" Dec 13 14:18:04.573152 kubelet[1957]: E1213 14:18:04.573112 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.573152 kubelet[1957]: W1213 14:18:04.573149 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.573269 kubelet[1957]: E1213 14:18:04.573173 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.573658 kubelet[1957]: E1213 14:18:04.573642 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.573658 kubelet[1957]: W1213 14:18:04.573656 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.573798 kubelet[1957]: E1213 14:18:04.573778 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.573882 kubelet[1957]: I1213 14:18:04.573869 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/29bb0d43-5e2c-4f1d-91bc-dc52da9da965-kubelet-dir\") pod \"csi-node-driver-5llpq\" (UID: \"29bb0d43-5e2c-4f1d-91bc-dc52da9da965\") " pod="calico-system/csi-node-driver-5llpq" Dec 13 14:18:04.573968 kubelet[1957]: E1213 14:18:04.573843 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.574030 kubelet[1957]: W1213 14:18:04.574018 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.574292 kubelet[1957]: E1213 14:18:04.574184 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.574435 kubelet[1957]: E1213 14:18:04.574419 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.574518 kubelet[1957]: W1213 14:18:04.574506 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.574789 kubelet[1957]: E1213 14:18:04.574775 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.574866 kubelet[1957]: W1213 14:18:04.574853 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.575063 kubelet[1957]: E1213 14:18:04.575053 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.575154 kubelet[1957]: W1213 14:18:04.575118 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.575412 kubelet[1957]: E1213 14:18:04.575391 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.575502 kubelet[1957]: W1213 14:18:04.575488 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.575722 kubelet[1957]: E1213 14:18:04.575711 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.575802 kubelet[1957]: W1213 14:18:04.575791 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.575940 kubelet[1957]: E1213 14:18:04.575722 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.575940 kubelet[1957]: E1213 14:18:04.575728 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.576010 kubelet[1957]: E1213 14:18:04.575733 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.576010 kubelet[1957]: E1213 14:18:04.575712 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.576097 kubelet[1957]: E1213 14:18:04.576082 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.576215 kubelet[1957]: E1213 14:18:04.576203 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.576284 kubelet[1957]: W1213 14:18:04.576271 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.576355 kubelet[1957]: E1213 14:18:04.576345 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.581058 kubelet[1957]: E1213 14:18:04.581042 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.581246 kubelet[1957]: W1213 14:18:04.581206 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.581417 kubelet[1957]: E1213 14:18:04.581377 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.581707 kubelet[1957]: E1213 14:18:04.581669 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.581707 kubelet[1957]: W1213 14:18:04.581688 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.581707 kubelet[1957]: E1213 14:18:04.581706 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.581918 kubelet[1957]: E1213 14:18:04.581906 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.581918 kubelet[1957]: W1213 14:18:04.581917 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.581987 kubelet[1957]: E1213 14:18:04.581957 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.582172 kubelet[1957]: E1213 14:18:04.582102 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.582172 kubelet[1957]: W1213 14:18:04.582115 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.582241 kubelet[1957]: E1213 14:18:04.582178 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.582362 kubelet[1957]: E1213 14:18:04.582347 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.582362 kubelet[1957]: W1213 14:18:04.582359 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.582435 kubelet[1957]: E1213 14:18:04.582409 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.582687 kubelet[1957]: E1213 14:18:04.582605 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.582687 kubelet[1957]: W1213 14:18:04.582618 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.582759 kubelet[1957]: E1213 14:18:04.582698 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.582884 kubelet[1957]: E1213 14:18:04.582868 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.582884 kubelet[1957]: W1213 14:18:04.582880 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.582953 kubelet[1957]: E1213 14:18:04.582895 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.583101 kubelet[1957]: E1213 14:18:04.583071 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.583101 kubelet[1957]: W1213 14:18:04.583085 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.583101 kubelet[1957]: E1213 14:18:04.583096 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.583268 kubelet[1957]: E1213 14:18:04.583254 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.583268 kubelet[1957]: W1213 14:18:04.583267 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.583328 kubelet[1957]: E1213 14:18:04.583279 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.583429 kubelet[1957]: E1213 14:18:04.583419 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.583429 kubelet[1957]: W1213 14:18:04.583429 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.583487 kubelet[1957]: E1213 14:18:04.583441 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.583751 kubelet[1957]: E1213 14:18:04.583722 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.583751 kubelet[1957]: W1213 14:18:04.583736 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.583831 kubelet[1957]: E1213 14:18:04.583824 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.584049 kubelet[1957]: E1213 14:18:04.584031 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.584049 kubelet[1957]: W1213 14:18:04.584043 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.584119 kubelet[1957]: E1213 14:18:04.584095 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.584119 kubelet[1957]: I1213 14:18:04.584115 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/29bb0d43-5e2c-4f1d-91bc-dc52da9da965-socket-dir\") pod \"csi-node-driver-5llpq\" (UID: \"29bb0d43-5e2c-4f1d-91bc-dc52da9da965\") " pod="calico-system/csi-node-driver-5llpq" Dec 13 14:18:04.584344 kubelet[1957]: E1213 14:18:04.584327 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.584344 kubelet[1957]: W1213 14:18:04.584340 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.584409 kubelet[1957]: E1213 14:18:04.584352 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.584612 kubelet[1957]: E1213 14:18:04.584597 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.584612 kubelet[1957]: W1213 14:18:04.584610 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.584685 kubelet[1957]: E1213 14:18:04.584624 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.584789 kubelet[1957]: E1213 14:18:04.584775 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.584789 kubelet[1957]: W1213 14:18:04.584785 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.584846 kubelet[1957]: E1213 14:18:04.584797 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.585028 kubelet[1957]: E1213 14:18:04.585017 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.585028 kubelet[1957]: W1213 14:18:04.585028 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.585086 kubelet[1957]: E1213 14:18:04.585050 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.585269 kubelet[1957]: E1213 14:18:04.585258 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.585317 kubelet[1957]: W1213 14:18:04.585269 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.585317 kubelet[1957]: E1213 14:18:04.585279 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.585447 kubelet[1957]: E1213 14:18:04.585437 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.585479 kubelet[1957]: W1213 14:18:04.585448 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.585479 kubelet[1957]: E1213 14:18:04.585456 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.613333 kubelet[1957]: E1213 14:18:04.613297 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:04.613775 env[1222]: time="2024-12-13T14:18:04.613722050Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6f5474f46d-42bp5,Uid:2957de9a-f53c-40b5-ad44-899fd63b09aa,Namespace:calico-system,Attempt:0,}" Dec 13 14:18:04.641786 env[1222]: time="2024-12-13T14:18:04.637947402Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:18:04.641953 env[1222]: time="2024-12-13T14:18:04.640176685Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:18:04.641953 env[1222]: time="2024-12-13T14:18:04.640199365Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:18:04.641953 env[1222]: time="2024-12-13T14:18:04.640403405Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/03bcdd5e2b34db929bd90a578dbd86a69f902ef0560a35c7480cc8057170c932 pid=2381 runtime=io.containerd.runc.v2 Dec 13 14:18:04.651038 systemd[1]: Started cri-containerd-03bcdd5e2b34db929bd90a578dbd86a69f902ef0560a35c7480cc8057170c932.scope. Dec 13 14:18:04.673233 kubelet[1957]: E1213 14:18:04.673060 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:04.675109 env[1222]: time="2024-12-13T14:18:04.673555648Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-c8gsw,Uid:2871946f-2d9e-4233-8d80-36032a627d2f,Namespace:calico-system,Attempt:0,}" Dec 13 14:18:04.685621 kubelet[1957]: E1213 14:18:04.685601 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.685761 kubelet[1957]: W1213 14:18:04.685744 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.685837 kubelet[1957]: E1213 14:18:04.685821 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.686114 kubelet[1957]: E1213 14:18:04.686101 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.686181 env[1222]: time="2024-12-13T14:18:04.686083265Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:18:04.686242 kubelet[1957]: W1213 14:18:04.686227 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.686284 env[1222]: time="2024-12-13T14:18:04.686187745Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:18:04.686284 env[1222]: time="2024-12-13T14:18:04.686202465Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:18:04.686515 kubelet[1957]: E1213 14:18:04.686495 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.686759 kubelet[1957]: E1213 14:18:04.686742 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.686800 kubelet[1957]: W1213 14:18:04.686775 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.686800 kubelet[1957]: E1213 14:18:04.686795 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.686000 audit: BPF prog-id=118 op=LOAD Dec 13 14:18:04.688369 kubelet[1957]: E1213 14:18:04.686977 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.688369 kubelet[1957]: W1213 14:18:04.686990 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.688369 kubelet[1957]: E1213 14:18:04.687006 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.688369 kubelet[1957]: E1213 14:18:04.687222 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.688369 kubelet[1957]: W1213 14:18:04.687232 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.688369 kubelet[1957]: E1213 14:18:04.687242 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.688515 env[1222]: time="2024-12-13T14:18:04.687470226Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a450e2799ea201f7281bb1e758b7c0a2d8206586991b61c37ff00b13ab4d3eca pid=2415 runtime=io.containerd.runc.v2 Dec 13 14:18:04.688690 kubelet[1957]: E1213 14:18:04.688670 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.688690 kubelet[1957]: W1213 14:18:04.688686 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2381 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033626364643565326233346462393239626439306135373864626438 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2381 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033626364643565326233346462393239626439306135373864626438 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit: BPF prog-id=119 op=LOAD Dec 13 14:18:04.687000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2381 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033626364643565326233346462393239626439306135373864626438 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit: BPF prog-id=120 op=LOAD Dec 13 14:18:04.687000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2381 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033626364643565326233346462393239626439306135373864626438 Dec 13 14:18:04.687000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:18:04.687000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.687000 audit: BPF prog-id=121 op=LOAD Dec 13 14:18:04.687000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2381 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033626364643565326233346462393239626439306135373864626438 Dec 13 14:18:04.690005 kubelet[1957]: E1213 14:18:04.688771 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.690005 kubelet[1957]: E1213 14:18:04.688852 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.690005 kubelet[1957]: W1213 14:18:04.688866 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.690005 kubelet[1957]: E1213 14:18:04.688940 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.690416 kubelet[1957]: E1213 14:18:04.690279 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.690416 kubelet[1957]: W1213 14:18:04.690297 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.690416 kubelet[1957]: E1213 14:18:04.690314 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.690555 kubelet[1957]: E1213 14:18:04.690537 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.690555 kubelet[1957]: W1213 14:18:04.690549 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.690624 kubelet[1957]: E1213 14:18:04.690597 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.690836 kubelet[1957]: E1213 14:18:04.690697 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.690836 kubelet[1957]: W1213 14:18:04.690707 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.690836 kubelet[1957]: E1213 14:18:04.690745 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.690943 kubelet[1957]: E1213 14:18:04.690859 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.690943 kubelet[1957]: W1213 14:18:04.690866 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.690943 kubelet[1957]: E1213 14:18:04.690899 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.691007 kubelet[1957]: E1213 14:18:04.690988 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.691007 kubelet[1957]: W1213 14:18:04.690994 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.691007 kubelet[1957]: E1213 14:18:04.691004 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.691210 kubelet[1957]: E1213 14:18:04.691181 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.691210 kubelet[1957]: W1213 14:18:04.691192 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.691210 kubelet[1957]: E1213 14:18:04.691208 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.691668 kubelet[1957]: E1213 14:18:04.691649 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.691752 kubelet[1957]: W1213 14:18:04.691738 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.691830 kubelet[1957]: E1213 14:18:04.691819 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.692090 kubelet[1957]: E1213 14:18:04.692076 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.692241 kubelet[1957]: W1213 14:18:04.692226 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.692318 kubelet[1957]: E1213 14:18:04.692304 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.692626 kubelet[1957]: E1213 14:18:04.692605 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.692626 kubelet[1957]: W1213 14:18:04.692624 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.692711 kubelet[1957]: E1213 14:18:04.692646 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.692844 kubelet[1957]: E1213 14:18:04.692832 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.692844 kubelet[1957]: W1213 14:18:04.692843 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.692903 kubelet[1957]: E1213 14:18:04.692858 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.693138 kubelet[1957]: E1213 14:18:04.693112 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.693178 kubelet[1957]: W1213 14:18:04.693124 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.693178 kubelet[1957]: E1213 14:18:04.693169 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.693427 kubelet[1957]: E1213 14:18:04.693410 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.693427 kubelet[1957]: W1213 14:18:04.693424 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.693494 kubelet[1957]: E1213 14:18:04.693441 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.693661 kubelet[1957]: E1213 14:18:04.693647 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.693661 kubelet[1957]: W1213 14:18:04.693659 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.693787 kubelet[1957]: E1213 14:18:04.693749 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.693872 kubelet[1957]: E1213 14:18:04.693859 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.693909 kubelet[1957]: W1213 14:18:04.693872 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.693909 kubelet[1957]: E1213 14:18:04.693888 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.694089 kubelet[1957]: E1213 14:18:04.694062 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.694089 kubelet[1957]: W1213 14:18:04.694086 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.694195 kubelet[1957]: E1213 14:18:04.694100 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.694482 kubelet[1957]: E1213 14:18:04.694463 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.694575 kubelet[1957]: W1213 14:18:04.694560 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.694664 kubelet[1957]: E1213 14:18:04.694651 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.694968 kubelet[1957]: E1213 14:18:04.694951 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.694968 kubelet[1957]: W1213 14:18:04.694969 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.695047 kubelet[1957]: E1213 14:18:04.694986 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.695403 kubelet[1957]: E1213 14:18:04.695361 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.695455 kubelet[1957]: W1213 14:18:04.695404 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.695455 kubelet[1957]: E1213 14:18:04.695420 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.702777 kubelet[1957]: E1213 14:18:04.702756 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:04.703018 kubelet[1957]: W1213 14:18:04.702999 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:04.703096 kubelet[1957]: E1213 14:18:04.703083 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:04.712387 systemd[1]: Started cri-containerd-a450e2799ea201f7281bb1e758b7c0a2d8206586991b61c37ff00b13ab4d3eca.scope. Dec 13 14:18:04.730645 env[1222]: time="2024-12-13T14:18:04.729304801Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6f5474f46d-42bp5,Uid:2957de9a-f53c-40b5-ad44-899fd63b09aa,Namespace:calico-system,Attempt:0,} returns sandbox id \"03bcdd5e2b34db929bd90a578dbd86a69f902ef0560a35c7480cc8057170c932\"" Dec 13 14:18:04.730807 kubelet[1957]: E1213 14:18:04.730061 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:04.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit: BPF prog-id=122 op=LOAD Dec 13 14:18:04.745000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[2435]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2415 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134353065323739396561323031663732383162623165373538623763 Dec 13 14:18:04.745000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[2435]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2415 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134353065323739396561323031663732383162623165373538623763 Dec 13 14:18:04.745000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.745000 audit: BPF prog-id=123 op=LOAD Dec 13 14:18:04.745000 audit[2435]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2415 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134353065323739396561323031663732383162623165373538623763 Dec 13 14:18:04.746000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.746000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.746000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.746000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.746000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.746000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.746000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.746000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.746000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.746000 audit: BPF prog-id=124 op=LOAD Dec 13 14:18:04.746000 audit[2435]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2415 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134353065323739396561323031663732383162623165373538623763 Dec 13 14:18:04.746000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:18:04.746000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:18:04.746000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.746000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.746000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.746000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.746000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.746000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.746000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.746000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.746000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.746000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:04.746000 audit: BPF prog-id=125 op=LOAD Dec 13 14:18:04.746000 audit[2435]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2415 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:04.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134353065323739396561323031663732383162623165373538623763 Dec 13 14:18:04.760874 env[1222]: time="2024-12-13T14:18:04.760825922Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-c8gsw,Uid:2871946f-2d9e-4233-8d80-36032a627d2f,Namespace:calico-system,Attempt:0,} returns sandbox id \"a450e2799ea201f7281bb1e758b7c0a2d8206586991b61c37ff00b13ab4d3eca\"" Dec 13 14:18:04.761941 env[1222]: time="2024-12-13T14:18:04.761598483Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:18:04.763481 kubelet[1957]: E1213 14:18:04.762256 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:05.133000 audit[2485]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2485 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:05.133000 audit[2485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=fffff94bff50 a2=0 a3=1 items=0 ppid=2108 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:05.133000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:05.138000 audit[2485]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2485 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:05.138000 audit[2485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff94bff50 a2=0 a3=1 items=0 ppid=2108 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:05.138000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:05.934548 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1156857329.mount: Deactivated successfully. Dec 13 14:18:06.079832 kubelet[1957]: E1213 14:18:06.079780 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5llpq" podUID="29bb0d43-5e2c-4f1d-91bc-dc52da9da965" Dec 13 14:18:06.463376 env[1222]: time="2024-12-13T14:18:06.463326269Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:06.465058 env[1222]: time="2024-12-13T14:18:06.465014911Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d1fc316829ae1650b0b1629b54232520f297e7c3b1444eecd290ae088902a28,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:06.466820 env[1222]: time="2024-12-13T14:18:06.466793113Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:06.469806 env[1222]: time="2024-12-13T14:18:06.469766917Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:06.470420 env[1222]: time="2024-12-13T14:18:06.470377277Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:1d1fc316829ae1650b0b1629b54232520f297e7c3b1444eecd290ae088902a28\"" Dec 13 14:18:06.472525 env[1222]: time="2024-12-13T14:18:06.472218160Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:18:06.480293 env[1222]: time="2024-12-13T14:18:06.480251329Z" level=info msg="CreateContainer within sandbox \"03bcdd5e2b34db929bd90a578dbd86a69f902ef0560a35c7480cc8057170c932\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:18:06.495890 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1489385361.mount: Deactivated successfully. Dec 13 14:18:06.501515 env[1222]: time="2024-12-13T14:18:06.501286273Z" level=info msg="CreateContainer within sandbox \"03bcdd5e2b34db929bd90a578dbd86a69f902ef0560a35c7480cc8057170c932\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"905245234e7313aa8f259a414f95ec297d114382e3aed8d7de27744fbd004c96\"" Dec 13 14:18:06.502281 env[1222]: time="2024-12-13T14:18:06.502242274Z" level=info msg="StartContainer for \"905245234e7313aa8f259a414f95ec297d114382e3aed8d7de27744fbd004c96\"" Dec 13 14:18:06.521144 systemd[1]: Started cri-containerd-905245234e7313aa8f259a414f95ec297d114382e3aed8d7de27744fbd004c96.scope. Dec 13 14:18:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.564000 audit: BPF prog-id=126 op=LOAD Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2381 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:06.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930353234353233346537333133616138663235396134313466393565 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2381 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:06.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930353234353233346537333133616138663235396134313466393565 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit: BPF prog-id=127 op=LOAD Dec 13 14:18:06.565000 audit[2496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2381 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:06.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930353234353233346537333133616138663235396134313466393565 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit: BPF prog-id=128 op=LOAD Dec 13 14:18:06.565000 audit[2496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2381 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:06.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930353234353233346537333133616138663235396134313466393565 Dec 13 14:18:06.565000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:18:06.565000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { perfmon } for pid=2496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit[2496]: AVC avc: denied { bpf } for pid=2496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:06.565000 audit: BPF prog-id=129 op=LOAD Dec 13 14:18:06.565000 audit[2496]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2381 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:06.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930353234353233346537333133616138663235396134313466393565 Dec 13 14:18:06.584237 env[1222]: time="2024-12-13T14:18:06.584194168Z" level=info msg="StartContainer for \"905245234e7313aa8f259a414f95ec297d114382e3aed8d7de27744fbd004c96\" returns successfully" Dec 13 14:18:06.589062 update_engine[1216]: I1213 14:18:06.589006 1216 update_attempter.cc:509] Updating boot flags... Dec 13 14:18:07.145406 kubelet[1957]: E1213 14:18:07.145152 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:07.165179 kubelet[1957]: I1213 14:18:07.164739 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6f5474f46d-42bp5" podStartSLOduration=1.4543361049999999 podStartE2EDuration="3.164723582s" podCreationTimestamp="2024-12-13 14:18:04 +0000 UTC" firstStartedPulling="2024-12-13 14:18:04.761150802 +0000 UTC m=+12.739612566" lastFinishedPulling="2024-12-13 14:18:06.471538279 +0000 UTC m=+14.450000043" observedRunningTime="2024-12-13 14:18:07.155714892 +0000 UTC m=+15.134176616" watchObservedRunningTime="2024-12-13 14:18:07.164723582 +0000 UTC m=+15.143185346" Dec 13 14:18:07.172000 audit[2544]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:07.172000 audit[2544]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd26425e0 a2=0 a3=1 items=0 ppid=2108 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:07.172000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:07.177000 audit[2544]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:07.177000 audit[2544]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffd26425e0 a2=0 a3=1 items=0 ppid=2108 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:07.177000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:07.179475 kubelet[1957]: E1213 14:18:07.179455 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.179597 kubelet[1957]: W1213 14:18:07.179580 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.179668 kubelet[1957]: E1213 14:18:07.179653 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.179910 kubelet[1957]: E1213 14:18:07.179889 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.179998 kubelet[1957]: W1213 14:18:07.179985 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.180063 kubelet[1957]: E1213 14:18:07.180050 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.180358 kubelet[1957]: E1213 14:18:07.180343 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.180459 kubelet[1957]: W1213 14:18:07.180445 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.180522 kubelet[1957]: E1213 14:18:07.180510 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.180759 kubelet[1957]: E1213 14:18:07.180746 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.180848 kubelet[1957]: W1213 14:18:07.180836 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.180910 kubelet[1957]: E1213 14:18:07.180899 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.181669 kubelet[1957]: E1213 14:18:07.181647 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.181669 kubelet[1957]: W1213 14:18:07.181664 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.181785 kubelet[1957]: E1213 14:18:07.181677 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.181847 kubelet[1957]: E1213 14:18:07.181833 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.181847 kubelet[1957]: W1213 14:18:07.181846 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.181944 kubelet[1957]: E1213 14:18:07.181855 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.181991 kubelet[1957]: E1213 14:18:07.181976 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.181991 kubelet[1957]: W1213 14:18:07.181987 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.182055 kubelet[1957]: E1213 14:18:07.181994 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.182162 kubelet[1957]: E1213 14:18:07.182147 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.182162 kubelet[1957]: W1213 14:18:07.182156 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.182252 kubelet[1957]: E1213 14:18:07.182165 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.182333 kubelet[1957]: E1213 14:18:07.182317 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.182333 kubelet[1957]: W1213 14:18:07.182328 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.182405 kubelet[1957]: E1213 14:18:07.182336 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.182484 kubelet[1957]: E1213 14:18:07.182467 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.182484 kubelet[1957]: W1213 14:18:07.182477 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.182484 kubelet[1957]: E1213 14:18:07.182485 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.183655 kubelet[1957]: E1213 14:18:07.183635 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.183655 kubelet[1957]: W1213 14:18:07.183651 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.183757 kubelet[1957]: E1213 14:18:07.183663 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.183859 kubelet[1957]: E1213 14:18:07.183848 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.183897 kubelet[1957]: W1213 14:18:07.183859 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.183897 kubelet[1957]: E1213 14:18:07.183868 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.184077 kubelet[1957]: E1213 14:18:07.184067 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.184077 kubelet[1957]: W1213 14:18:07.184077 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.184191 kubelet[1957]: E1213 14:18:07.184086 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.184273 kubelet[1957]: E1213 14:18:07.184262 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.184273 kubelet[1957]: W1213 14:18:07.184273 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.184339 kubelet[1957]: E1213 14:18:07.184281 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.184429 kubelet[1957]: E1213 14:18:07.184420 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.184429 kubelet[1957]: W1213 14:18:07.184429 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.184490 kubelet[1957]: E1213 14:18:07.184436 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.208954 kubelet[1957]: E1213 14:18:07.208934 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.209063 kubelet[1957]: W1213 14:18:07.209048 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.209142 kubelet[1957]: E1213 14:18:07.209115 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.209452 kubelet[1957]: E1213 14:18:07.209437 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.209613 kubelet[1957]: W1213 14:18:07.209598 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.209769 kubelet[1957]: E1213 14:18:07.209696 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.210013 kubelet[1957]: E1213 14:18:07.209999 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.210090 kubelet[1957]: W1213 14:18:07.210077 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.210180 kubelet[1957]: E1213 14:18:07.210167 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.210397 kubelet[1957]: E1213 14:18:07.210358 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.210397 kubelet[1957]: W1213 14:18:07.210375 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.210397 kubelet[1957]: E1213 14:18:07.210391 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.210600 kubelet[1957]: E1213 14:18:07.210587 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.210600 kubelet[1957]: W1213 14:18:07.210599 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.210667 kubelet[1957]: E1213 14:18:07.210613 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.210763 kubelet[1957]: E1213 14:18:07.210749 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.210763 kubelet[1957]: W1213 14:18:07.210760 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.210818 kubelet[1957]: E1213 14:18:07.210769 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.210896 kubelet[1957]: E1213 14:18:07.210885 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.210933 kubelet[1957]: W1213 14:18:07.210898 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.210980 kubelet[1957]: E1213 14:18:07.210968 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.211053 kubelet[1957]: E1213 14:18:07.211043 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.211053 kubelet[1957]: W1213 14:18:07.211052 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.211228 kubelet[1957]: E1213 14:18:07.211178 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.211293 kubelet[1957]: E1213 14:18:07.211280 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.211293 kubelet[1957]: W1213 14:18:07.211291 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.211352 kubelet[1957]: E1213 14:18:07.211304 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.211513 kubelet[1957]: E1213 14:18:07.211502 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.211513 kubelet[1957]: W1213 14:18:07.211513 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.211569 kubelet[1957]: E1213 14:18:07.211528 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.211705 kubelet[1957]: E1213 14:18:07.211695 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.211740 kubelet[1957]: W1213 14:18:07.211705 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.211740 kubelet[1957]: E1213 14:18:07.211714 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.212049 kubelet[1957]: E1213 14:18:07.212035 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.212049 kubelet[1957]: W1213 14:18:07.212047 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.212119 kubelet[1957]: E1213 14:18:07.212062 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.212252 kubelet[1957]: E1213 14:18:07.212234 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.212252 kubelet[1957]: W1213 14:18:07.212251 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.212319 kubelet[1957]: E1213 14:18:07.212265 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.212525 kubelet[1957]: E1213 14:18:07.212508 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.212597 kubelet[1957]: W1213 14:18:07.212584 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.212662 kubelet[1957]: E1213 14:18:07.212650 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.212911 kubelet[1957]: E1213 14:18:07.212895 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.212911 kubelet[1957]: W1213 14:18:07.212910 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.212978 kubelet[1957]: E1213 14:18:07.212925 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.213104 kubelet[1957]: E1213 14:18:07.213090 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.213104 kubelet[1957]: W1213 14:18:07.213101 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.213194 kubelet[1957]: E1213 14:18:07.213110 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.213311 kubelet[1957]: E1213 14:18:07.213298 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.213311 kubelet[1957]: W1213 14:18:07.213309 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.213363 kubelet[1957]: E1213 14:18:07.213325 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.213686 kubelet[1957]: E1213 14:18:07.213659 1957 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:07.213686 kubelet[1957]: W1213 14:18:07.213673 1957 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:07.213686 kubelet[1957]: E1213 14:18:07.213684 1957 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:07.594798 env[1222]: time="2024-12-13T14:18:07.594758485Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:07.597507 env[1222]: time="2024-12-13T14:18:07.597455448Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:07.599306 env[1222]: time="2024-12-13T14:18:07.599268369Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:07.601427 env[1222]: time="2024-12-13T14:18:07.601384772Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:07.601612 env[1222]: time="2024-12-13T14:18:07.601581692Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348\"" Dec 13 14:18:07.605957 env[1222]: time="2024-12-13T14:18:07.605907457Z" level=info msg="CreateContainer within sandbox \"a450e2799ea201f7281bb1e758b7c0a2d8206586991b61c37ff00b13ab4d3eca\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:18:07.623676 env[1222]: time="2024-12-13T14:18:07.623619716Z" level=info msg="CreateContainer within sandbox \"a450e2799ea201f7281bb1e758b7c0a2d8206586991b61c37ff00b13ab4d3eca\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"49326edde7949205c11bb87e90854d9fc5cdbddb7bfec781deb33794f6a60027\"" Dec 13 14:18:07.624881 env[1222]: time="2024-12-13T14:18:07.624483677Z" level=info msg="StartContainer for \"49326edde7949205c11bb87e90854d9fc5cdbddb7bfec781deb33794f6a60027\"" Dec 13 14:18:07.643049 systemd[1]: Started cri-containerd-49326edde7949205c11bb87e90854d9fc5cdbddb7bfec781deb33794f6a60027.scope. Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2415 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:07.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439333236656464653739343932303563313162623837653930383534 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit: BPF prog-id=130 op=LOAD Dec 13 14:18:07.692000 audit[2586]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2415 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:07.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439333236656464653739343932303563313162623837653930383534 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit: BPF prog-id=131 op=LOAD Dec 13 14:18:07.692000 audit[2586]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2415 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:07.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439333236656464653739343932303563313162623837653930383534 Dec 13 14:18:07.692000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:18:07.692000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:07.692000 audit: BPF prog-id=132 op=LOAD Dec 13 14:18:07.692000 audit[2586]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2415 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:07.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439333236656464653739343932303563313162623837653930383534 Dec 13 14:18:07.727385 systemd[1]: cri-containerd-49326edde7949205c11bb87e90854d9fc5cdbddb7bfec781deb33794f6a60027.scope: Deactivated successfully. Dec 13 14:18:07.728301 env[1222]: time="2024-12-13T14:18:07.728207268Z" level=info msg="StartContainer for \"49326edde7949205c11bb87e90854d9fc5cdbddb7bfec781deb33794f6a60027\" returns successfully" Dec 13 14:18:07.732000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:18:07.763646 env[1222]: time="2024-12-13T14:18:07.763600306Z" level=info msg="shim disconnected" id=49326edde7949205c11bb87e90854d9fc5cdbddb7bfec781deb33794f6a60027 Dec 13 14:18:07.763860 env[1222]: time="2024-12-13T14:18:07.763842426Z" level=warning msg="cleaning up after shim disconnected" id=49326edde7949205c11bb87e90854d9fc5cdbddb7bfec781deb33794f6a60027 namespace=k8s.io Dec 13 14:18:07.763917 env[1222]: time="2024-12-13T14:18:07.763905507Z" level=info msg="cleaning up dead shim" Dec 13 14:18:07.772813 env[1222]: time="2024-12-13T14:18:07.772762076Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:18:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2624 runtime=io.containerd.runc.v2\n" Dec 13 14:18:08.080645 kubelet[1957]: E1213 14:18:08.080581 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5llpq" podUID="29bb0d43-5e2c-4f1d-91bc-dc52da9da965" Dec 13 14:18:08.148535 kubelet[1957]: E1213 14:18:08.147498 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:08.148535 kubelet[1957]: E1213 14:18:08.148050 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:08.148888 env[1222]: time="2024-12-13T14:18:08.148844591Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:18:08.476274 systemd[1]: run-containerd-runc-k8s.io-49326edde7949205c11bb87e90854d9fc5cdbddb7bfec781deb33794f6a60027-runc.ajK6SW.mount: Deactivated successfully. Dec 13 14:18:08.476369 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-49326edde7949205c11bb87e90854d9fc5cdbddb7bfec781deb33794f6a60027-rootfs.mount: Deactivated successfully. Dec 13 14:18:09.148789 kubelet[1957]: E1213 14:18:09.148755 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:10.086764 kubelet[1957]: E1213 14:18:10.086709 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5llpq" podUID="29bb0d43-5e2c-4f1d-91bc-dc52da9da965" Dec 13 14:18:12.084544 kubelet[1957]: E1213 14:18:12.084507 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5llpq" podUID="29bb0d43-5e2c-4f1d-91bc-dc52da9da965" Dec 13 14:18:12.154818 env[1222]: time="2024-12-13T14:18:12.154758191Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:12.156222 env[1222]: time="2024-12-13T14:18:12.156194592Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:12.157654 env[1222]: time="2024-12-13T14:18:12.157608354Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:12.158862 env[1222]: time="2024-12-13T14:18:12.158837914Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:12.159306 env[1222]: time="2024-12-13T14:18:12.159278515Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f\"" Dec 13 14:18:12.165615 env[1222]: time="2024-12-13T14:18:12.163624358Z" level=info msg="CreateContainer within sandbox \"a450e2799ea201f7281bb1e758b7c0a2d8206586991b61c37ff00b13ab4d3eca\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:18:12.191879 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2399164741.mount: Deactivated successfully. Dec 13 14:18:12.196355 env[1222]: time="2024-12-13T14:18:12.196307144Z" level=info msg="CreateContainer within sandbox \"a450e2799ea201f7281bb1e758b7c0a2d8206586991b61c37ff00b13ab4d3eca\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e20f5faba3aaf21344722417c0686df9fb4c64a7d87ba1d5c89e89e972607ad3\"" Dec 13 14:18:12.196804 env[1222]: time="2024-12-13T14:18:12.196776264Z" level=info msg="StartContainer for \"e20f5faba3aaf21344722417c0686df9fb4c64a7d87ba1d5c89e89e972607ad3\"" Dec 13 14:18:12.228469 systemd[1]: Started cri-containerd-e20f5faba3aaf21344722417c0686df9fb4c64a7d87ba1d5c89e89e972607ad3.scope. Dec 13 14:18:12.265000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.268564 kernel: kauditd_printk_skb: 229 callbacks suppressed Dec 13 14:18:12.268624 kernel: audit: type=1400 audit(1734099492.265:1002): avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.268652 kernel: audit: type=1300 audit(1734099492.265:1002): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2415 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:12.265000 audit[2651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2415 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:12.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532306635666162613361616632313334343732323431376330363836 Dec 13 14:18:12.273823 kernel: audit: type=1327 audit(1734099492.265:1002): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532306635666162613361616632313334343732323431376330363836 Dec 13 14:18:12.273878 kernel: audit: type=1400 audit(1734099492.265:1003): avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.265000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.265000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.277801 kernel: audit: type=1400 audit(1734099492.265:1003): avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.277879 kernel: audit: type=1400 audit(1734099492.265:1003): avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.265000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.280112 kernel: audit: type=1400 audit(1734099492.265:1003): avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.265000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.281271 kernel: audit: type=1400 audit(1734099492.265:1003): avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.265000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.265000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.284770 kernel: audit: type=1400 audit(1734099492.265:1003): avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.284818 kernel: audit: type=1400 audit(1734099492.265:1003): avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.265000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.265000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.265000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.265000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.265000 audit: BPF prog-id=133 op=LOAD Dec 13 14:18:12.265000 audit[2651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2415 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:12.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532306635666162613361616632313334343732323431376330363836 Dec 13 14:18:12.266000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.266000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.266000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.266000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.266000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.266000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.266000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.266000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.266000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.266000 audit: BPF prog-id=134 op=LOAD Dec 13 14:18:12.266000 audit[2651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2415 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:12.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532306635666162613361616632313334343732323431376330363836 Dec 13 14:18:12.267000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:18:12.267000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:18:12.267000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.267000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.267000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.267000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.267000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.267000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.267000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.267000 audit[2651]: AVC avc: denied { perfmon } for pid=2651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.267000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.267000 audit[2651]: AVC avc: denied { bpf } for pid=2651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:12.267000 audit: BPF prog-id=135 op=LOAD Dec 13 14:18:12.267000 audit[2651]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2415 pid=2651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:12.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532306635666162613361616632313334343732323431376330363836 Dec 13 14:18:12.299069 env[1222]: time="2024-12-13T14:18:12.299029384Z" level=info msg="StartContainer for \"e20f5faba3aaf21344722417c0686df9fb4c64a7d87ba1d5c89e89e972607ad3\" returns successfully" Dec 13 14:18:12.799909 systemd[1]: cri-containerd-e20f5faba3aaf21344722417c0686df9fb4c64a7d87ba1d5c89e89e972607ad3.scope: Deactivated successfully. Dec 13 14:18:12.802000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:18:12.850103 kubelet[1957]: I1213 14:18:12.850064 1957 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 14:18:12.853220 env[1222]: time="2024-12-13T14:18:12.853167815Z" level=info msg="shim disconnected" id=e20f5faba3aaf21344722417c0686df9fb4c64a7d87ba1d5c89e89e972607ad3 Dec 13 14:18:12.853220 env[1222]: time="2024-12-13T14:18:12.853215575Z" level=warning msg="cleaning up after shim disconnected" id=e20f5faba3aaf21344722417c0686df9fb4c64a7d87ba1d5c89e89e972607ad3 namespace=k8s.io Dec 13 14:18:12.853343 env[1222]: time="2024-12-13T14:18:12.853226575Z" level=info msg="cleaning up dead shim" Dec 13 14:18:12.869528 env[1222]: time="2024-12-13T14:18:12.869474548Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:18:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2693 runtime=io.containerd.runc.v2\n" Dec 13 14:18:12.889970 systemd[1]: Created slice kubepods-burstable-pod37cabeba_c967_4ce9_8cc6_a2c93781d3be.slice. Dec 13 14:18:12.895377 systemd[1]: Created slice kubepods-burstable-pod679e6bd2_1bda_4ac3_9dc1_b4d0e81bd8b9.slice. Dec 13 14:18:12.901234 systemd[1]: Created slice kubepods-besteffort-podd6f83580_b3c3_4c3b_b3a0_70e6a6f0d8c1.slice. Dec 13 14:18:12.907198 systemd[1]: Created slice kubepods-besteffort-pod9d06110c_3d65_4ba2_a219_42723ec9b262.slice. Dec 13 14:18:12.912391 systemd[1]: Created slice kubepods-besteffort-pod757821e6_5631_4cb2_8280_cc916fab5158.slice. Dec 13 14:18:13.056305 kubelet[1957]: I1213 14:18:13.056205 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9ccp4\" (UniqueName: \"kubernetes.io/projected/9d06110c-3d65-4ba2-a219-42723ec9b262-kube-api-access-9ccp4\") pod \"calico-apiserver-6c989998dd-99gmc\" (UID: \"9d06110c-3d65-4ba2-a219-42723ec9b262\") " pod="calico-apiserver/calico-apiserver-6c989998dd-99gmc" Dec 13 14:18:13.056305 kubelet[1957]: I1213 14:18:13.056285 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xhmkg\" (UniqueName: \"kubernetes.io/projected/d6f83580-b3c3-4c3b-b3a0-70e6a6f0d8c1-kube-api-access-xhmkg\") pod \"calico-apiserver-6c989998dd-kqlz6\" (UID: \"d6f83580-b3c3-4c3b-b3a0-70e6a6f0d8c1\") " pod="calico-apiserver/calico-apiserver-6c989998dd-kqlz6" Dec 13 14:18:13.056305 kubelet[1957]: I1213 14:18:13.056307 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/679e6bd2-1bda-4ac3-9dc1-b4d0e81bd8b9-config-volume\") pod \"coredns-6f6b679f8f-rxqcv\" (UID: \"679e6bd2-1bda-4ac3-9dc1-b4d0e81bd8b9\") " pod="kube-system/coredns-6f6b679f8f-rxqcv" Dec 13 14:18:13.056496 kubelet[1957]: I1213 14:18:13.056338 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8hqv6\" (UniqueName: \"kubernetes.io/projected/37cabeba-c967-4ce9-8cc6-a2c93781d3be-kube-api-access-8hqv6\") pod \"coredns-6f6b679f8f-k7v25\" (UID: \"37cabeba-c967-4ce9-8cc6-a2c93781d3be\") " pod="kube-system/coredns-6f6b679f8f-k7v25" Dec 13 14:18:13.056496 kubelet[1957]: I1213 14:18:13.056359 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d6f83580-b3c3-4c3b-b3a0-70e6a6f0d8c1-calico-apiserver-certs\") pod \"calico-apiserver-6c989998dd-kqlz6\" (UID: \"d6f83580-b3c3-4c3b-b3a0-70e6a6f0d8c1\") " pod="calico-apiserver/calico-apiserver-6c989998dd-kqlz6" Dec 13 14:18:13.056496 kubelet[1957]: I1213 14:18:13.056388 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g4dq8\" (UniqueName: \"kubernetes.io/projected/679e6bd2-1bda-4ac3-9dc1-b4d0e81bd8b9-kube-api-access-g4dq8\") pod \"coredns-6f6b679f8f-rxqcv\" (UID: \"679e6bd2-1bda-4ac3-9dc1-b4d0e81bd8b9\") " pod="kube-system/coredns-6f6b679f8f-rxqcv" Dec 13 14:18:13.056496 kubelet[1957]: I1213 14:18:13.056422 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/757821e6-5631-4cb2-8280-cc916fab5158-tigera-ca-bundle\") pod \"calico-kube-controllers-7f9f6b67d6-5bs66\" (UID: \"757821e6-5631-4cb2-8280-cc916fab5158\") " pod="calico-system/calico-kube-controllers-7f9f6b67d6-5bs66" Dec 13 14:18:13.056496 kubelet[1957]: I1213 14:18:13.056446 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9d06110c-3d65-4ba2-a219-42723ec9b262-calico-apiserver-certs\") pod \"calico-apiserver-6c989998dd-99gmc\" (UID: \"9d06110c-3d65-4ba2-a219-42723ec9b262\") " pod="calico-apiserver/calico-apiserver-6c989998dd-99gmc" Dec 13 14:18:13.056620 kubelet[1957]: I1213 14:18:13.056463 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/37cabeba-c967-4ce9-8cc6-a2c93781d3be-config-volume\") pod \"coredns-6f6b679f8f-k7v25\" (UID: \"37cabeba-c967-4ce9-8cc6-a2c93781d3be\") " pod="kube-system/coredns-6f6b679f8f-k7v25" Dec 13 14:18:13.056620 kubelet[1957]: I1213 14:18:13.056491 1957 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jvslk\" (UniqueName: \"kubernetes.io/projected/757821e6-5631-4cb2-8280-cc916fab5158-kube-api-access-jvslk\") pod \"calico-kube-controllers-7f9f6b67d6-5bs66\" (UID: \"757821e6-5631-4cb2-8280-cc916fab5158\") " pod="calico-system/calico-kube-controllers-7f9f6b67d6-5bs66" Dec 13 14:18:13.160487 kubelet[1957]: E1213 14:18:13.160424 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:13.163030 env[1222]: time="2024-12-13T14:18:13.162785328Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:18:13.194869 kubelet[1957]: E1213 14:18:13.194828 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:13.195905 env[1222]: time="2024-12-13T14:18:13.195584512Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-k7v25,Uid:37cabeba-c967-4ce9-8cc6-a2c93781d3be,Namespace:kube-system,Attempt:0,}" Dec 13 14:18:13.195746 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e20f5faba3aaf21344722417c0686df9fb4c64a7d87ba1d5c89e89e972607ad3-rootfs.mount: Deactivated successfully. Dec 13 14:18:13.198915 kubelet[1957]: E1213 14:18:13.198863 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:13.199491 env[1222]: time="2024-12-13T14:18:13.199303475Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-rxqcv,Uid:679e6bd2-1bda-4ac3-9dc1-b4d0e81bd8b9,Namespace:kube-system,Attempt:0,}" Dec 13 14:18:13.204964 env[1222]: time="2024-12-13T14:18:13.204900439Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c989998dd-kqlz6,Uid:d6f83580-b3c3-4c3b-b3a0-70e6a6f0d8c1,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:18:13.219948 env[1222]: time="2024-12-13T14:18:13.219909850Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7f9f6b67d6-5bs66,Uid:757821e6-5631-4cb2-8280-cc916fab5158,Namespace:calico-system,Attempt:0,}" Dec 13 14:18:13.220350 env[1222]: time="2024-12-13T14:18:13.220321890Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c989998dd-99gmc,Uid:9d06110c-3d65-4ba2-a219-42723ec9b262,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:18:13.490841 env[1222]: time="2024-12-13T14:18:13.490776688Z" level=error msg="Failed to destroy network for sandbox \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.491345 env[1222]: time="2024-12-13T14:18:13.491310768Z" level=error msg="encountered an error cleaning up failed sandbox \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.491497 env[1222]: time="2024-12-13T14:18:13.491468328Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c989998dd-99gmc,Uid:9d06110c-3d65-4ba2-a219-42723ec9b262,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.492631 kubelet[1957]: E1213 14:18:13.492587 1957 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.492723 kubelet[1957]: E1213 14:18:13.492670 1957 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6c989998dd-99gmc" Dec 13 14:18:13.492723 kubelet[1957]: E1213 14:18:13.492693 1957 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6c989998dd-99gmc" Dec 13 14:18:13.492779 kubelet[1957]: E1213 14:18:13.492739 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6c989998dd-99gmc_calico-apiserver(9d06110c-3d65-4ba2-a219-42723ec9b262)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6c989998dd-99gmc_calico-apiserver(9d06110c-3d65-4ba2-a219-42723ec9b262)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6c989998dd-99gmc" podUID="9d06110c-3d65-4ba2-a219-42723ec9b262" Dec 13 14:18:13.498787 env[1222]: time="2024-12-13T14:18:13.498749814Z" level=error msg="Failed to destroy network for sandbox \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.499233 env[1222]: time="2024-12-13T14:18:13.499199014Z" level=error msg="encountered an error cleaning up failed sandbox \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.499442 env[1222]: time="2024-12-13T14:18:13.499412414Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c989998dd-kqlz6,Uid:d6f83580-b3c3-4c3b-b3a0-70e6a6f0d8c1,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.499606 env[1222]: time="2024-12-13T14:18:13.499360974Z" level=error msg="Failed to destroy network for sandbox \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.499829 kubelet[1957]: E1213 14:18:13.499795 1957 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.499889 kubelet[1957]: E1213 14:18:13.499846 1957 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6c989998dd-kqlz6" Dec 13 14:18:13.499889 kubelet[1957]: E1213 14:18:13.499868 1957 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6c989998dd-kqlz6" Dec 13 14:18:13.499955 kubelet[1957]: E1213 14:18:13.499908 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6c989998dd-kqlz6_calico-apiserver(d6f83580-b3c3-4c3b-b3a0-70e6a6f0d8c1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6c989998dd-kqlz6_calico-apiserver(d6f83580-b3c3-4c3b-b3a0-70e6a6f0d8c1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6c989998dd-kqlz6" podUID="d6f83580-b3c3-4c3b-b3a0-70e6a6f0d8c1" Dec 13 14:18:13.500264 env[1222]: time="2024-12-13T14:18:13.500230775Z" level=error msg="Failed to destroy network for sandbox \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.501702 env[1222]: time="2024-12-13T14:18:13.501665296Z" level=error msg="encountered an error cleaning up failed sandbox \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.501830 env[1222]: time="2024-12-13T14:18:13.501802016Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7f9f6b67d6-5bs66,Uid:757821e6-5631-4cb2-8280-cc916fab5158,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.501960 env[1222]: time="2024-12-13T14:18:13.501682856Z" level=error msg="encountered an error cleaning up failed sandbox \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.502004 env[1222]: time="2024-12-13T14:18:13.501975896Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-k7v25,Uid:37cabeba-c967-4ce9-8cc6-a2c93781d3be,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.502182 kubelet[1957]: E1213 14:18:13.502156 1957 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.502227 kubelet[1957]: E1213 14:18:13.502211 1957 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-k7v25" Dec 13 14:18:13.502346 kubelet[1957]: E1213 14:18:13.502228 1957 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-k7v25" Dec 13 14:18:13.502346 kubelet[1957]: E1213 14:18:13.502257 1957 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.502427 kubelet[1957]: E1213 14:18:13.502353 1957 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7f9f6b67d6-5bs66" Dec 13 14:18:13.502427 kubelet[1957]: E1213 14:18:13.502269 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-k7v25_kube-system(37cabeba-c967-4ce9-8cc6-a2c93781d3be)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-k7v25_kube-system(37cabeba-c967-4ce9-8cc6-a2c93781d3be)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-k7v25" podUID="37cabeba-c967-4ce9-8cc6-a2c93781d3be" Dec 13 14:18:13.502427 kubelet[1957]: E1213 14:18:13.502375 1957 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7f9f6b67d6-5bs66" Dec 13 14:18:13.502519 kubelet[1957]: E1213 14:18:13.502424 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7f9f6b67d6-5bs66_calico-system(757821e6-5631-4cb2-8280-cc916fab5158)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7f9f6b67d6-5bs66_calico-system(757821e6-5631-4cb2-8280-cc916fab5158)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7f9f6b67d6-5bs66" podUID="757821e6-5631-4cb2-8280-cc916fab5158" Dec 13 14:18:13.511228 env[1222]: time="2024-12-13T14:18:13.511180583Z" level=error msg="Failed to destroy network for sandbox \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.511541 env[1222]: time="2024-12-13T14:18:13.511512943Z" level=error msg="encountered an error cleaning up failed sandbox \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.511583 env[1222]: time="2024-12-13T14:18:13.511557543Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-rxqcv,Uid:679e6bd2-1bda-4ac3-9dc1-b4d0e81bd8b9,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.511763 kubelet[1957]: E1213 14:18:13.511718 1957 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:13.511806 kubelet[1957]: E1213 14:18:13.511778 1957 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-rxqcv" Dec 13 14:18:13.511806 kubelet[1957]: E1213 14:18:13.511796 1957 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-rxqcv" Dec 13 14:18:13.511875 kubelet[1957]: E1213 14:18:13.511848 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-rxqcv_kube-system(679e6bd2-1bda-4ac3-9dc1-b4d0e81bd8b9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-rxqcv_kube-system(679e6bd2-1bda-4ac3-9dc1-b4d0e81bd8b9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-rxqcv" podUID="679e6bd2-1bda-4ac3-9dc1-b4d0e81bd8b9" Dec 13 14:18:14.084523 systemd[1]: Created slice kubepods-besteffort-pod29bb0d43_5e2c_4f1d_91bc_dc52da9da965.slice. Dec 13 14:18:14.089727 env[1222]: time="2024-12-13T14:18:14.089689401Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5llpq,Uid:29bb0d43-5e2c-4f1d-91bc-dc52da9da965,Namespace:calico-system,Attempt:0,}" Dec 13 14:18:14.152274 env[1222]: time="2024-12-13T14:18:14.152218724Z" level=error msg="Failed to destroy network for sandbox \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:14.153308 env[1222]: time="2024-12-13T14:18:14.153266525Z" level=error msg="encountered an error cleaning up failed sandbox \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:14.153863 env[1222]: time="2024-12-13T14:18:14.153326445Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5llpq,Uid:29bb0d43-5e2c-4f1d-91bc-dc52da9da965,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:14.154429 kubelet[1957]: E1213 14:18:14.154391 1957 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:14.154492 kubelet[1957]: E1213 14:18:14.154463 1957 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5llpq" Dec 13 14:18:14.154492 kubelet[1957]: E1213 14:18:14.154483 1957 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5llpq" Dec 13 14:18:14.154549 kubelet[1957]: E1213 14:18:14.154527 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-5llpq_calico-system(29bb0d43-5e2c-4f1d-91bc-dc52da9da965)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-5llpq_calico-system(29bb0d43-5e2c-4f1d-91bc-dc52da9da965)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5llpq" podUID="29bb0d43-5e2c-4f1d-91bc-dc52da9da965" Dec 13 14:18:14.167092 kubelet[1957]: I1213 14:18:14.165812 1957 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Dec 13 14:18:14.167092 kubelet[1957]: I1213 14:18:14.166596 1957 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Dec 13 14:18:14.167453 env[1222]: time="2024-12-13T14:18:14.166561094Z" level=info msg="StopPodSandbox for \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\"" Dec 13 14:18:14.167453 env[1222]: time="2024-12-13T14:18:14.167332134Z" level=info msg="StopPodSandbox for \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\"" Dec 13 14:18:14.168362 kubelet[1957]: I1213 14:18:14.168055 1957 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Dec 13 14:18:14.168515 env[1222]: time="2024-12-13T14:18:14.168484775Z" level=info msg="StopPodSandbox for \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\"" Dec 13 14:18:14.169640 kubelet[1957]: I1213 14:18:14.169249 1957 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Dec 13 14:18:14.169724 env[1222]: time="2024-12-13T14:18:14.169650616Z" level=info msg="StopPodSandbox for \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\"" Dec 13 14:18:14.171747 kubelet[1957]: I1213 14:18:14.171718 1957 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Dec 13 14:18:14.172190 env[1222]: time="2024-12-13T14:18:14.172165538Z" level=info msg="StopPodSandbox for \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\"" Dec 13 14:18:14.174959 kubelet[1957]: I1213 14:18:14.174933 1957 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Dec 13 14:18:14.175881 env[1222]: time="2024-12-13T14:18:14.175844540Z" level=info msg="StopPodSandbox for \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\"" Dec 13 14:18:14.190011 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9-shm.mount: Deactivated successfully. Dec 13 14:18:14.190098 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28-shm.mount: Deactivated successfully. Dec 13 14:18:14.190158 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7-shm.mount: Deactivated successfully. Dec 13 14:18:14.207710 env[1222]: time="2024-12-13T14:18:14.207648802Z" level=error msg="StopPodSandbox for \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\" failed" error="failed to destroy network for sandbox \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:14.208180 kubelet[1957]: E1213 14:18:14.207987 1957 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Dec 13 14:18:14.208180 kubelet[1957]: E1213 14:18:14.208044 1957 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28"} Dec 13 14:18:14.208180 kubelet[1957]: E1213 14:18:14.208102 1957 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"679e6bd2-1bda-4ac3-9dc1-b4d0e81bd8b9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:18:14.208180 kubelet[1957]: E1213 14:18:14.208124 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"679e6bd2-1bda-4ac3-9dc1-b4d0e81bd8b9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-rxqcv" podUID="679e6bd2-1bda-4ac3-9dc1-b4d0e81bd8b9" Dec 13 14:18:14.223217 env[1222]: time="2024-12-13T14:18:14.223163412Z" level=error msg="StopPodSandbox for \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\" failed" error="failed to destroy network for sandbox \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:14.223564 kubelet[1957]: E1213 14:18:14.223423 1957 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Dec 13 14:18:14.223564 kubelet[1957]: E1213 14:18:14.223473 1957 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9"} Dec 13 14:18:14.223564 kubelet[1957]: E1213 14:18:14.223511 1957 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d6f83580-b3c3-4c3b-b3a0-70e6a6f0d8c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:18:14.223564 kubelet[1957]: E1213 14:18:14.223531 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d6f83580-b3c3-4c3b-b3a0-70e6a6f0d8c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6c989998dd-kqlz6" podUID="d6f83580-b3c3-4c3b-b3a0-70e6a6f0d8c1" Dec 13 14:18:14.228635 env[1222]: time="2024-12-13T14:18:14.228583336Z" level=error msg="StopPodSandbox for \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\" failed" error="failed to destroy network for sandbox \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:14.228845 kubelet[1957]: E1213 14:18:14.228805 1957 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Dec 13 14:18:14.228895 kubelet[1957]: E1213 14:18:14.228853 1957 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526"} Dec 13 14:18:14.228895 kubelet[1957]: E1213 14:18:14.228881 1957 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"757821e6-5631-4cb2-8280-cc916fab5158\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:18:14.228973 kubelet[1957]: E1213 14:18:14.228908 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"757821e6-5631-4cb2-8280-cc916fab5158\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7f9f6b67d6-5bs66" podUID="757821e6-5631-4cb2-8280-cc916fab5158" Dec 13 14:18:14.240809 env[1222]: time="2024-12-13T14:18:14.240757825Z" level=error msg="StopPodSandbox for \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\" failed" error="failed to destroy network for sandbox \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:14.241146 kubelet[1957]: E1213 14:18:14.241002 1957 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Dec 13 14:18:14.241146 kubelet[1957]: E1213 14:18:14.241058 1957 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7"} Dec 13 14:18:14.241146 kubelet[1957]: E1213 14:18:14.241085 1957 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"37cabeba-c967-4ce9-8cc6-a2c93781d3be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:18:14.241146 kubelet[1957]: E1213 14:18:14.241103 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"37cabeba-c967-4ce9-8cc6-a2c93781d3be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-k7v25" podUID="37cabeba-c967-4ce9-8cc6-a2c93781d3be" Dec 13 14:18:14.241824 env[1222]: time="2024-12-13T14:18:14.241786465Z" level=error msg="StopPodSandbox for \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\" failed" error="failed to destroy network for sandbox \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:14.241960 kubelet[1957]: E1213 14:18:14.241934 1957 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Dec 13 14:18:14.242004 kubelet[1957]: E1213 14:18:14.241968 1957 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f"} Dec 13 14:18:14.242059 kubelet[1957]: E1213 14:18:14.241993 1957 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9d06110c-3d65-4ba2-a219-42723ec9b262\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:18:14.242114 kubelet[1957]: E1213 14:18:14.242065 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9d06110c-3d65-4ba2-a219-42723ec9b262\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6c989998dd-99gmc" podUID="9d06110c-3d65-4ba2-a219-42723ec9b262" Dec 13 14:18:14.249998 env[1222]: time="2024-12-13T14:18:14.249772111Z" level=error msg="StopPodSandbox for \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\" failed" error="failed to destroy network for sandbox \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:18:14.250296 kubelet[1957]: E1213 14:18:14.250185 1957 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Dec 13 14:18:14.250296 kubelet[1957]: E1213 14:18:14.250222 1957 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141"} Dec 13 14:18:14.250296 kubelet[1957]: E1213 14:18:14.250249 1957 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"29bb0d43-5e2c-4f1d-91bc-dc52da9da965\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:18:14.250296 kubelet[1957]: E1213 14:18:14.250267 1957 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"29bb0d43-5e2c-4f1d-91bc-dc52da9da965\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5llpq" podUID="29bb0d43-5e2c-4f1d-91bc-dc52da9da965" Dec 13 14:18:18.211255 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount523727257.mount: Deactivated successfully. Dec 13 14:18:18.296502 env[1222]: time="2024-12-13T14:18:18.296452988Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:18.298022 env[1222]: time="2024-12-13T14:18:18.297974309Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:18.299501 env[1222]: time="2024-12-13T14:18:18.299477990Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:18.300839 env[1222]: time="2024-12-13T14:18:18.300803071Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:18.301334 env[1222]: time="2024-12-13T14:18:18.301307351Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758\"" Dec 13 14:18:18.313456 env[1222]: time="2024-12-13T14:18:18.313417157Z" level=info msg="CreateContainer within sandbox \"a450e2799ea201f7281bb1e758b7c0a2d8206586991b61c37ff00b13ab4d3eca\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:18:18.325677 env[1222]: time="2024-12-13T14:18:18.325639524Z" level=info msg="CreateContainer within sandbox \"a450e2799ea201f7281bb1e758b7c0a2d8206586991b61c37ff00b13ab4d3eca\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b7a093cd268a3626352c10cf3cf2122319df07def01a74660ef8f83cf3cdf42a\"" Dec 13 14:18:18.326162 env[1222]: time="2024-12-13T14:18:18.326114884Z" level=info msg="StartContainer for \"b7a093cd268a3626352c10cf3cf2122319df07def01a74660ef8f83cf3cdf42a\"" Dec 13 14:18:18.341804 systemd[1]: Started cri-containerd-b7a093cd268a3626352c10cf3cf2122319df07def01a74660ef8f83cf3cdf42a.scope. Dec 13 14:18:18.387000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.389392 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:18:18.389451 kernel: audit: type=1400 audit(1734099498.387:1009): avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.387000 audit[3086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2415 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:18.393704 kernel: audit: type=1300 audit(1734099498.387:1009): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2415 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:18.393768 kernel: audit: type=1327 audit(1734099498.387:1009): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237613039336364323638613336323633353263313063663363663231 Dec 13 14:18:18.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237613039336364323638613336323633353263313063663363663231 Dec 13 14:18:18.387000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.397820 kernel: audit: type=1400 audit(1734099498.387:1010): avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.397871 kernel: audit: type=1400 audit(1734099498.387:1010): avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.387000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.399501 kernel: audit: type=1400 audit(1734099498.387:1010): avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.387000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.401187 kernel: audit: type=1400 audit(1734099498.387:1010): avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.387000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.387000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.404620 kernel: audit: type=1400 audit(1734099498.387:1010): avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.387000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.406496 kernel: audit: type=1400 audit(1734099498.387:1010): avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.406571 kernel: audit: type=1400 audit(1734099498.387:1010): avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.387000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.387000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.387000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.387000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.387000 audit: BPF prog-id=136 op=LOAD Dec 13 14:18:18.387000 audit[3086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2415 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:18.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237613039336364323638613336323633353263313063663363663231 Dec 13 14:18:18.388000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.388000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.388000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.388000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.388000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.388000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.388000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.388000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.388000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.388000 audit: BPF prog-id=137 op=LOAD Dec 13 14:18:18.388000 audit[3086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2415 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:18.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237613039336364323638613336323633353263313063663363663231 Dec 13 14:18:18.389000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:18:18.390000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:18:18.390000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.390000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.390000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.390000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.390000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.390000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.390000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.390000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.390000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.390000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:18.390000 audit: BPF prog-id=138 op=LOAD Dec 13 14:18:18.390000 audit[3086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2415 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:18.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237613039336364323638613336323633353263313063663363663231 Dec 13 14:18:18.412835 env[1222]: time="2024-12-13T14:18:18.412794930Z" level=info msg="StartContainer for \"b7a093cd268a3626352c10cf3cf2122319df07def01a74660ef8f83cf3cdf42a\" returns successfully" Dec 13 14:18:18.569666 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:18:18.569774 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:18:19.186158 kubelet[1957]: E1213 14:18:19.185752 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:19.206602 kubelet[1957]: I1213 14:18:19.206529 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-c8gsw" podStartSLOduration=1.667315237 podStartE2EDuration="15.206512903s" podCreationTimestamp="2024-12-13 14:18:04 +0000 UTC" firstStartedPulling="2024-12-13 14:18:04.762875005 +0000 UTC m=+12.741336769" lastFinishedPulling="2024-12-13 14:18:18.302072711 +0000 UTC m=+26.280534435" observedRunningTime="2024-12-13 14:18:19.204484382 +0000 UTC m=+27.182946146" watchObservedRunningTime="2024-12-13 14:18:19.206512903 +0000 UTC m=+27.184974667" Dec 13 14:18:19.818000 audit[3220]: AVC avc: denied { write } for pid=3220 comm="tee" name="fd" dev="proc" ino=19036 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:18:19.818000 audit[3220]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdb57ba30 a2=241 a3=1b6 items=1 ppid=3187 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:19.818000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:18:19.818000 audit: PATH item=0 name="/dev/fd/63" inode=19033 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:19.818000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:18:19.829000 audit[3226]: AVC avc: denied { write } for pid=3226 comm="tee" name="fd" dev="proc" ino=17391 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:18:19.829000 audit[3226]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe2e14a2f a2=241 a3=1b6 items=1 ppid=3179 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:19.829000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:18:19.829000 audit: PATH item=0 name="/dev/fd/63" inode=18153 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:19.829000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:18:19.833000 audit[3224]: AVC avc: denied { write } for pid=3224 comm="tee" name="fd" dev="proc" ino=19042 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:18:19.835000 audit[3234]: AVC avc: denied { write } for pid=3234 comm="tee" name="fd" dev="proc" ino=19047 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:18:19.833000 audit[3224]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffc7c4a2e a2=241 a3=1b6 items=1 ppid=3183 pid=3224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:19.833000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:18:19.833000 audit: PATH item=0 name="/dev/fd/63" inode=18152 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:19.833000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:18:19.835000 audit[3234]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc55a6a2e a2=241 a3=1b6 items=1 ppid=3184 pid=3234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:19.835000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:18:19.835000 audit: PATH item=0 name="/dev/fd/63" inode=17386 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:19.835000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:18:19.838000 audit[3242]: AVC avc: denied { write } for pid=3242 comm="tee" name="fd" dev="proc" ino=19052 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:18:19.838000 audit[3242]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc3178a2e a2=241 a3=1b6 items=1 ppid=3175 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:19.838000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:18:19.838000 audit: PATH item=0 name="/dev/fd/63" inode=19459 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:19.838000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:18:19.857000 audit[3250]: AVC avc: denied { write } for pid=3250 comm="tee" name="fd" dev="proc" ino=19465 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:18:19.857000 audit[3250]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd0989a1e a2=241 a3=1b6 items=1 ppid=3195 pid=3250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:19.857000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:18:19.857000 audit: PATH item=0 name="/dev/fd/63" inode=18156 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:19.857000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:18:19.902000 audit[3258]: AVC avc: denied { write } for pid=3258 comm="tee" name="fd" dev="proc" ino=17402 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:18:19.902000 audit[3258]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc678aa1f a2=241 a3=1b6 items=1 ppid=3177 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:19.902000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:18:19.902000 audit: PATH item=0 name="/dev/fd/63" inode=19462 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:19.902000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:18:19.963000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.963000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.963000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.963000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.963000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.963000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.963000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.963000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.963000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.963000 audit: BPF prog-id=139 op=LOAD Dec 13 14:18:19.963000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc7661798 a2=98 a3=ffffc7661788 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:19.963000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:19.963000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:18:19.964000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.964000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.964000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.964000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.964000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.964000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.964000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.964000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.964000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.964000 audit: BPF prog-id=140 op=LOAD Dec 13 14:18:19.964000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc7661428 a2=74 a3=95 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:19.964000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:19.964000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:18:19.964000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.964000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.964000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.964000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.964000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.964000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.964000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.964000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.964000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:19.964000 audit: BPF prog-id=141 op=LOAD Dec 13 14:18:19.964000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc7661488 a2=94 a3=2 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:19.964000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:19.964000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:18:20.051000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.051000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.051000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.051000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.051000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.051000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.051000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.051000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.051000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.051000 audit: BPF prog-id=142 op=LOAD Dec 13 14:18:20.051000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc7661448 a2=40 a3=ffffc7661478 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.051000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.052000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:18:20.052000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.052000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc7661560 a2=50 a3=0 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.060000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.060000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc76614b8 a2=28 a3=ffffc76615e8 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.060000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.060000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.060000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc76614e8 a2=28 a3=ffffc7661618 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.060000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.060000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.060000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc7661398 a2=28 a3=ffffc76614c8 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.060000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.060000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.060000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc7661508 a2=28 a3=ffffc7661638 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.060000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.060000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.060000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc76614e8 a2=28 a3=ffffc7661618 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.060000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.060000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.060000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc76614d8 a2=28 a3=ffffc7661608 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.060000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.060000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.060000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc7661508 a2=28 a3=ffffc7661638 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.060000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.060000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.060000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc76614e8 a2=28 a3=ffffc7661618 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.060000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.060000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.060000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc7661508 a2=28 a3=ffffc7661638 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.060000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.060000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.060000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffc76614d8 a2=28 a3=ffffc7661608 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.060000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.060000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.060000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc7661558 a2=28 a3=ffffc7661698 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.060000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc7661290 a2=50 a3=0 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.061000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit: BPF prog-id=143 op=LOAD Dec 13 14:18:20.061000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc7661298 a2=94 a3=5 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.061000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.061000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc76613a0 a2=50 a3=0 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.061000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffc76614e8 a2=4 a3=3 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.061000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { confidentiality } for pid=3288 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:20.061000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc76614c8 a2=94 a3=6 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.061000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { confidentiality } for pid=3288 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:20.061000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc7660c98 a2=94 a3=83 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.061000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { perfmon } for pid=3288 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { bpf } for pid=3288 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.061000 audit[3288]: AVC avc: denied { confidentiality } for pid=3288 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:20.061000 audit[3288]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffc7660c98 a2=94 a3=83 items=0 ppid=3186 pid=3288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.061000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit: BPF prog-id=144 op=LOAD Dec 13 14:18:20.072000 audit[3296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffe2a4b48 a2=98 a3=fffffe2a4b38 items=0 ppid=3186 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.072000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:18:20.072000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit: BPF prog-id=145 op=LOAD Dec 13 14:18:20.072000 audit[3296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffe2a49f8 a2=74 a3=95 items=0 ppid=3186 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.072000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:18:20.072000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.072000 audit: BPF prog-id=146 op=LOAD Dec 13 14:18:20.072000 audit[3296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffe2a4a28 a2=40 a3=fffffe2a4a58 items=0 ppid=3186 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.072000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:18:20.072000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:18:20.121844 systemd-networkd[1057]: vxlan.calico: Link UP Dec 13 14:18:20.121853 systemd-networkd[1057]: vxlan.calico: Gained carrier Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit: BPF prog-id=147 op=LOAD Dec 13 14:18:20.146000 audit[3323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffff0cb8b8 a2=98 a3=ffffff0cb8a8 items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.146000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:18:20.146000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit: BPF prog-id=148 op=LOAD Dec 13 14:18:20.146000 audit[3323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffff0cb598 a2=74 a3=95 items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.146000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:18:20.146000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.146000 audit: BPF prog-id=149 op=LOAD Dec 13 14:18:20.146000 audit[3323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffff0cb5f8 a2=94 a3=2 items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.146000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:18:20.147000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:18:20.147000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.147000 audit[3323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffff0cb628 a2=28 a3=ffffff0cb758 items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.147000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:18:20.147000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.147000 audit[3323]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffff0cb658 a2=28 a3=ffffff0cb788 items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.147000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:18:20.147000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.147000 audit[3323]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffff0cb508 a2=28 a3=ffffff0cb638 items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.147000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:18:20.147000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.147000 audit[3323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffff0cb678 a2=28 a3=ffffff0cb7a8 items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.147000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:18:20.147000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.147000 audit[3323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffff0cb658 a2=28 a3=ffffff0cb788 items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.147000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:18:20.147000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.147000 audit[3323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffff0cb648 a2=28 a3=ffffff0cb778 items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.147000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:18:20.148000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.148000 audit[3323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffff0cb678 a2=28 a3=ffffff0cb7a8 items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:18:20.148000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.148000 audit[3323]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffff0cb658 a2=28 a3=ffffff0cb788 items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:18:20.148000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.148000 audit[3323]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffff0cb678 a2=28 a3=ffffff0cb7a8 items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:18:20.148000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.148000 audit[3323]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffff0cb648 a2=28 a3=ffffff0cb778 items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:18:20.148000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.148000 audit[3323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffff0cb6c8 a2=28 a3=ffffff0cb808 items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:18:20.148000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.148000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.148000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.148000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.148000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.148000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.148000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.148000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.148000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.148000 audit: BPF prog-id=150 op=LOAD Dec 13 14:18:20.148000 audit[3323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffff0cb4e8 a2=40 a3=ffffff0cb518 items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.148000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:18:20.148000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffff0cb510 a2=50 a3=0 items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.149000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffff0cb510 a2=50 a3=0 items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.149000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit: BPF prog-id=151 op=LOAD Dec 13 14:18:20.149000 audit[3323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffff0cac78 a2=94 a3=2 items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.149000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:18:20.149000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { perfmon } for pid=3323 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit[3323]: AVC avc: denied { bpf } for pid=3323 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.149000 audit: BPF prog-id=152 op=LOAD Dec 13 14:18:20.149000 audit[3323]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffff0cae08 a2=94 a3=2d items=0 ppid=3186 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.149000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit: BPF prog-id=153 op=LOAD Dec 13 14:18:20.153000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffeab7e198 a2=98 a3=ffffeab7e188 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.153000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.153000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit: BPF prog-id=154 op=LOAD Dec 13 14:18:20.153000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeab7de28 a2=74 a3=95 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.153000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.153000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.153000 audit: BPF prog-id=155 op=LOAD Dec 13 14:18:20.153000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeab7de88 a2=94 a3=2 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.153000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.153000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:18:20.187589 kubelet[1957]: E1213 14:18:20.187548 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:20.206265 systemd[1]: run-containerd-runc-k8s.io-b7a093cd268a3626352c10cf3cf2122319df07def01a74660ef8f83cf3cdf42a-runc.VjmJiR.mount: Deactivated successfully. Dec 13 14:18:20.252000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.252000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.252000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.252000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.252000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.252000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.252000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.252000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.252000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.252000 audit: BPF prog-id=156 op=LOAD Dec 13 14:18:20.252000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeab7de48 a2=40 a3=ffffeab7de78 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.252000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.253000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:18:20.253000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.253000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffeab7df60 a2=50 a3=0 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.253000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.262000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.262000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeab7deb8 a2=28 a3=ffffeab7dfe8 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.262000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.263000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.263000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeab7dee8 a2=28 a3=ffffeab7e018 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.263000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.263000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.263000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeab7dd98 a2=28 a3=ffffeab7dec8 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.263000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.263000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.263000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeab7df08 a2=28 a3=ffffeab7e038 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.263000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.263000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.263000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeab7dee8 a2=28 a3=ffffeab7e018 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.263000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.264000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.264000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeab7ded8 a2=28 a3=ffffeab7e008 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.264000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.264000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.264000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeab7df08 a2=28 a3=ffffeab7e038 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.264000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.264000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.264000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeab7dee8 a2=28 a3=ffffeab7e018 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.264000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.265000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.265000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeab7df08 a2=28 a3=ffffeab7e038 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.265000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.265000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.265000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeab7ded8 a2=28 a3=ffffeab7e008 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.265000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.265000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.265000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeab7df58 a2=28 a3=ffffeab7e098 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.265000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.266000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.266000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffeab7dc90 a2=50 a3=0 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.266000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.266000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.266000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.266000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.266000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.266000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.266000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.266000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.266000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.266000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.266000 audit: BPF prog-id=157 op=LOAD Dec 13 14:18:20.266000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffeab7dc98 a2=94 a3=5 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.266000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.266000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:18:20.266000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.266000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffeab7dda0 a2=50 a3=0 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.266000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.267000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.267000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffeab7dee8 a2=4 a3=3 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.267000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.267000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.267000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.267000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.267000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.267000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.267000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.267000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.267000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.267000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.267000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:20.267000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeab7dec8 a2=94 a3=6 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.267000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:20.268000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeab7d698 a2=94 a3=83 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.268000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { perfmon } for pid=3329 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.268000 audit[3329]: AVC avc: denied { confidentiality } for pid=3329 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:18:20.268000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeab7d698 a2=94 a3=83 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.268000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.269000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.269000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffeab7f0d8 a2=10 a3=ffffeab7f1c8 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.269000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.269000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.269000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffeab7ef98 a2=10 a3=ffffeab7f088 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.269000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.270000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.270000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffeab7ef08 a2=10 a3=ffffeab7f088 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.270000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.270000 audit[3329]: AVC avc: denied { bpf } for pid=3329 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:20.270000 audit[3329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffeab7ef08 a2=10 a3=ffffeab7f088 items=0 ppid=3186 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.270000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:18:20.281000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:18:20.334000 audit[3379]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3379 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:18:20.334000 audit[3379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffe760f3d0 a2=0 a3=ffff85549fa8 items=0 ppid=3186 pid=3379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.334000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:18:20.341000 audit[3381]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3381 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:18:20.341000 audit[3381]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffcb9c2ad0 a2=0 a3=ffff98915fa8 items=0 ppid=3186 pid=3381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.341000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:18:20.345000 audit[3382]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3382 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:18:20.345000 audit[3382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffe55b6c20 a2=0 a3=ffffa479efa8 items=0 ppid=3186 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.345000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:18:20.346000 audit[3378]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3378 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:18:20.346000 audit[3378]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffeae036f0 a2=0 a3=ffffa5d53fa8 items=0 ppid=3186 pid=3378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:20.346000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:18:21.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.118:22-10.0.0.1:35754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:21.114573 systemd[1]: Started sshd@7-10.0.0.118:22-10.0.0.1:35754.service. Dec 13 14:18:21.164000 audit[3394]: USER_ACCT pid=3394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:21.166204 sshd[3394]: Accepted publickey for core from 10.0.0.1 port 35754 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:18:21.167000 audit[3394]: CRED_ACQ pid=3394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:21.168000 audit[3394]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc572a130 a2=3 a3=1 items=0 ppid=1 pid=3394 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:21.168000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:21.169627 sshd[3394]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:21.173374 systemd-logind[1210]: New session 8 of user core. Dec 13 14:18:21.174199 systemd[1]: Started session-8.scope. Dec 13 14:18:21.176000 audit[3394]: USER_START pid=3394 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:21.177000 audit[3396]: CRED_ACQ pid=3396 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:21.344903 sshd[3394]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:21.344000 audit[3394]: USER_END pid=3394 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:21.344000 audit[3394]: CRED_DISP pid=3394 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:21.347527 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:18:21.348097 systemd-logind[1210]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:18:21.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.118:22-10.0.0.1:35754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:21.348245 systemd[1]: sshd@7-10.0.0.118:22-10.0.0.1:35754.service: Deactivated successfully. Dec 13 14:18:21.349205 systemd-logind[1210]: Removed session 8. Dec 13 14:18:21.995352 systemd-networkd[1057]: vxlan.calico: Gained IPv6LL Dec 13 14:18:26.349826 systemd[1]: Started sshd@8-10.0.0.118:22-10.0.0.1:48800.service. Dec 13 14:18:26.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.118:22-10.0.0.1:48800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:26.350488 kernel: kauditd_printk_skb: 559 callbacks suppressed Dec 13 14:18:26.350543 kernel: audit: type=1130 audit(1734099506.348:1126): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.118:22-10.0.0.1:48800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:26.385000 audit[3421]: USER_ACCT pid=3421 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:26.386698 sshd[3421]: Accepted publickey for core from 10.0.0.1 port 48800 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:18:26.388250 sshd[3421]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:26.386000 audit[3421]: CRED_ACQ pid=3421 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:26.391046 kernel: audit: type=1101 audit(1734099506.385:1127): pid=3421 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:26.391116 kernel: audit: type=1103 audit(1734099506.386:1128): pid=3421 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:26.391571 systemd-logind[1210]: New session 9 of user core. Dec 13 14:18:26.392439 systemd[1]: Started session-9.scope. Dec 13 14:18:26.392572 kernel: audit: type=1006 audit(1734099506.386:1129): pid=3421 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Dec 13 14:18:26.392615 kernel: audit: type=1300 audit(1734099506.386:1129): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc71d1ca0 a2=3 a3=1 items=0 ppid=1 pid=3421 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:26.386000 audit[3421]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc71d1ca0 a2=3 a3=1 items=0 ppid=1 pid=3421 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:26.386000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:26.396772 kernel: audit: type=1327 audit(1734099506.386:1129): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:26.394000 audit[3421]: USER_START pid=3421 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:26.399905 kernel: audit: type=1105 audit(1734099506.394:1130): pid=3421 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:26.395000 audit[3423]: CRED_ACQ pid=3423 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:26.402642 kernel: audit: type=1103 audit(1734099506.395:1131): pid=3423 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:26.507864 sshd[3421]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:26.507000 audit[3421]: USER_END pid=3421 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:26.510327 systemd[1]: sshd@8-10.0.0.118:22-10.0.0.1:48800.service: Deactivated successfully. Dec 13 14:18:26.511052 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:18:26.507000 audit[3421]: CRED_DISP pid=3421 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:26.511534 systemd-logind[1210]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:18:26.512281 systemd-logind[1210]: Removed session 9. Dec 13 14:18:26.513717 kernel: audit: type=1106 audit(1734099506.507:1132): pid=3421 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:26.513783 kernel: audit: type=1104 audit(1734099506.507:1133): pid=3421 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:26.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.118:22-10.0.0.1:48800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.081102 env[1222]: time="2024-12-13T14:18:27.081052863Z" level=info msg="StopPodSandbox for \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\"" Dec 13 14:18:27.081573 env[1222]: time="2024-12-13T14:18:27.081541143Z" level=info msg="StopPodSandbox for \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\"" Dec 13 14:18:27.081748 env[1222]: time="2024-12-13T14:18:27.081603983Z" level=info msg="StopPodSandbox for \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\"" Dec 13 14:18:27.356151 env[1222]: 2024-12-13 14:18:27.187 [INFO][3480] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Dec 13 14:18:27.356151 env[1222]: 2024-12-13 14:18:27.188 [INFO][3480] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" iface="eth0" netns="/var/run/netns/cni-39a98c34-973d-7846-27e2-bb8e08b453dc" Dec 13 14:18:27.356151 env[1222]: 2024-12-13 14:18:27.189 [INFO][3480] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" iface="eth0" netns="/var/run/netns/cni-39a98c34-973d-7846-27e2-bb8e08b453dc" Dec 13 14:18:27.356151 env[1222]: 2024-12-13 14:18:27.191 [INFO][3480] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" iface="eth0" netns="/var/run/netns/cni-39a98c34-973d-7846-27e2-bb8e08b453dc" Dec 13 14:18:27.356151 env[1222]: 2024-12-13 14:18:27.191 [INFO][3480] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Dec 13 14:18:27.356151 env[1222]: 2024-12-13 14:18:27.192 [INFO][3480] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Dec 13 14:18:27.356151 env[1222]: 2024-12-13 14:18:27.336 [INFO][3507] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" HandleID="k8s-pod-network.4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Workload="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0" Dec 13 14:18:27.356151 env[1222]: 2024-12-13 14:18:27.336 [INFO][3507] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:27.356151 env[1222]: 2024-12-13 14:18:27.336 [INFO][3507] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:27.356151 env[1222]: 2024-12-13 14:18:27.347 [WARNING][3507] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" HandleID="k8s-pod-network.4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Workload="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0" Dec 13 14:18:27.356151 env[1222]: 2024-12-13 14:18:27.347 [INFO][3507] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" HandleID="k8s-pod-network.4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Workload="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0" Dec 13 14:18:27.356151 env[1222]: 2024-12-13 14:18:27.349 [INFO][3507] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:27.356151 env[1222]: 2024-12-13 14:18:27.351 [INFO][3480] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Dec 13 14:18:27.356151 env[1222]: time="2024-12-13T14:18:27.354369464Z" level=info msg="TearDown network for sandbox \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\" successfully" Dec 13 14:18:27.356151 env[1222]: time="2024-12-13T14:18:27.354401584Z" level=info msg="StopPodSandbox for \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\" returns successfully" Dec 13 14:18:27.356332 systemd[1]: run-netns-cni\x2d39a98c34\x2d973d\x2d7846\x2d27e2\x2dbb8e08b453dc.mount: Deactivated successfully. Dec 13 14:18:27.357368 env[1222]: time="2024-12-13T14:18:27.357324105Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c989998dd-kqlz6,Uid:d6f83580-b3c3-4c3b-b3a0-70e6a6f0d8c1,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:18:27.368579 env[1222]: 2024-12-13 14:18:27.190 [INFO][3487] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Dec 13 14:18:27.368579 env[1222]: 2024-12-13 14:18:27.191 [INFO][3487] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" iface="eth0" netns="/var/run/netns/cni-bc6191d2-ec48-30ac-886c-da2412b6f892" Dec 13 14:18:27.368579 env[1222]: 2024-12-13 14:18:27.192 [INFO][3487] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" iface="eth0" netns="/var/run/netns/cni-bc6191d2-ec48-30ac-886c-da2412b6f892" Dec 13 14:18:27.368579 env[1222]: 2024-12-13 14:18:27.192 [INFO][3487] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" iface="eth0" netns="/var/run/netns/cni-bc6191d2-ec48-30ac-886c-da2412b6f892" Dec 13 14:18:27.368579 env[1222]: 2024-12-13 14:18:27.192 [INFO][3487] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Dec 13 14:18:27.368579 env[1222]: 2024-12-13 14:18:27.192 [INFO][3487] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Dec 13 14:18:27.368579 env[1222]: 2024-12-13 14:18:27.336 [INFO][3509] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" HandleID="k8s-pod-network.8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Workload="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0" Dec 13 14:18:27.368579 env[1222]: 2024-12-13 14:18:27.336 [INFO][3509] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:27.368579 env[1222]: 2024-12-13 14:18:27.349 [INFO][3509] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:27.368579 env[1222]: 2024-12-13 14:18:27.360 [WARNING][3509] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" HandleID="k8s-pod-network.8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Workload="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0" Dec 13 14:18:27.368579 env[1222]: 2024-12-13 14:18:27.360 [INFO][3509] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" HandleID="k8s-pod-network.8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Workload="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0" Dec 13 14:18:27.368579 env[1222]: 2024-12-13 14:18:27.361 [INFO][3509] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:27.368579 env[1222]: 2024-12-13 14:18:27.366 [INFO][3487] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Dec 13 14:18:27.371340 env[1222]: time="2024-12-13T14:18:27.371228349Z" level=info msg="TearDown network for sandbox \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\" successfully" Dec 13 14:18:27.371420 env[1222]: time="2024-12-13T14:18:27.371337149Z" level=info msg="StopPodSandbox for \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\" returns successfully" Dec 13 14:18:27.372403 env[1222]: time="2024-12-13T14:18:27.372354709Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7f9f6b67d6-5bs66,Uid:757821e6-5631-4cb2-8280-cc916fab5158,Namespace:calico-system,Attempt:1,}" Dec 13 14:18:27.372865 systemd[1]: run-netns-cni\x2dbc6191d2\x2dec48\x2d30ac\x2d886c\x2dda2412b6f892.mount: Deactivated successfully. Dec 13 14:18:27.380232 env[1222]: 2024-12-13 14:18:27.189 [INFO][3485] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Dec 13 14:18:27.380232 env[1222]: 2024-12-13 14:18:27.189 [INFO][3485] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" iface="eth0" netns="/var/run/netns/cni-f881ce8e-c8ca-8f13-3eb5-2f6692e23094" Dec 13 14:18:27.380232 env[1222]: 2024-12-13 14:18:27.189 [INFO][3485] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" iface="eth0" netns="/var/run/netns/cni-f881ce8e-c8ca-8f13-3eb5-2f6692e23094" Dec 13 14:18:27.380232 env[1222]: 2024-12-13 14:18:27.192 [INFO][3485] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" iface="eth0" netns="/var/run/netns/cni-f881ce8e-c8ca-8f13-3eb5-2f6692e23094" Dec 13 14:18:27.380232 env[1222]: 2024-12-13 14:18:27.192 [INFO][3485] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Dec 13 14:18:27.380232 env[1222]: 2024-12-13 14:18:27.192 [INFO][3485] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Dec 13 14:18:27.380232 env[1222]: 2024-12-13 14:18:27.336 [INFO][3508] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" HandleID="k8s-pod-network.1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Workload="localhost-k8s-coredns--6f6b679f8f--k7v25-eth0" Dec 13 14:18:27.380232 env[1222]: 2024-12-13 14:18:27.336 [INFO][3508] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:27.380232 env[1222]: 2024-12-13 14:18:27.361 [INFO][3508] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:27.380232 env[1222]: 2024-12-13 14:18:27.370 [WARNING][3508] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" HandleID="k8s-pod-network.1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Workload="localhost-k8s-coredns--6f6b679f8f--k7v25-eth0" Dec 13 14:18:27.380232 env[1222]: 2024-12-13 14:18:27.370 [INFO][3508] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" HandleID="k8s-pod-network.1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Workload="localhost-k8s-coredns--6f6b679f8f--k7v25-eth0" Dec 13 14:18:27.380232 env[1222]: 2024-12-13 14:18:27.372 [INFO][3508] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:27.380232 env[1222]: 2024-12-13 14:18:27.375 [INFO][3485] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Dec 13 14:18:27.380739 env[1222]: time="2024-12-13T14:18:27.380359232Z" level=info msg="TearDown network for sandbox \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\" successfully" Dec 13 14:18:27.380739 env[1222]: time="2024-12-13T14:18:27.380386192Z" level=info msg="StopPodSandbox for \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\" returns successfully" Dec 13 14:18:27.381058 kubelet[1957]: E1213 14:18:27.381026 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:27.382494 env[1222]: time="2024-12-13T14:18:27.381814792Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-k7v25,Uid:37cabeba-c967-4ce9-8cc6-a2c93781d3be,Namespace:kube-system,Attempt:1,}" Dec 13 14:18:27.383093 systemd[1]: run-netns-cni\x2df881ce8e\x2dc8ca\x2d8f13\x2d3eb5\x2d2f6692e23094.mount: Deactivated successfully. Dec 13 14:18:27.518331 systemd-networkd[1057]: cali3e36ebc54d6: Link UP Dec 13 14:18:27.520877 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:18:27.520931 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3e36ebc54d6: link becomes ready Dec 13 14:18:27.519977 systemd-networkd[1057]: cali3e36ebc54d6: Gained carrier Dec 13 14:18:27.542419 env[1222]: 2024-12-13 14:18:27.432 [INFO][3541] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0 calico-kube-controllers-7f9f6b67d6- calico-system 757821e6-5631-4cb2-8280-cc916fab5158 818 0 2024-12-13 14:18:04 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7f9f6b67d6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-7f9f6b67d6-5bs66 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali3e36ebc54d6 [] []}} ContainerID="8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37" Namespace="calico-system" Pod="calico-kube-controllers-7f9f6b67d6-5bs66" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-" Dec 13 14:18:27.542419 env[1222]: 2024-12-13 14:18:27.432 [INFO][3541] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37" Namespace="calico-system" Pod="calico-kube-controllers-7f9f6b67d6-5bs66" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0" Dec 13 14:18:27.542419 env[1222]: 2024-12-13 14:18:27.462 [INFO][3574] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37" HandleID="k8s-pod-network.8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37" Workload="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0" Dec 13 14:18:27.542419 env[1222]: 2024-12-13 14:18:27.474 [INFO][3574] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37" HandleID="k8s-pod-network.8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37" Workload="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d8b70), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-7f9f6b67d6-5bs66", "timestamp":"2024-12-13 14:18:27.462327176 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:18:27.542419 env[1222]: 2024-12-13 14:18:27.474 [INFO][3574] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:27.542419 env[1222]: 2024-12-13 14:18:27.474 [INFO][3574] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:27.542419 env[1222]: 2024-12-13 14:18:27.474 [INFO][3574] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:18:27.542419 env[1222]: 2024-12-13 14:18:27.476 [INFO][3574] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37" host="localhost" Dec 13 14:18:27.542419 env[1222]: 2024-12-13 14:18:27.484 [INFO][3574] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:18:27.542419 env[1222]: 2024-12-13 14:18:27.490 [INFO][3574] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:18:27.542419 env[1222]: 2024-12-13 14:18:27.492 [INFO][3574] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:18:27.542419 env[1222]: 2024-12-13 14:18:27.494 [INFO][3574] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:18:27.542419 env[1222]: 2024-12-13 14:18:27.494 [INFO][3574] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37" host="localhost" Dec 13 14:18:27.542419 env[1222]: 2024-12-13 14:18:27.496 [INFO][3574] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37 Dec 13 14:18:27.542419 env[1222]: 2024-12-13 14:18:27.504 [INFO][3574] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37" host="localhost" Dec 13 14:18:27.542419 env[1222]: 2024-12-13 14:18:27.510 [INFO][3574] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37" host="localhost" Dec 13 14:18:27.542419 env[1222]: 2024-12-13 14:18:27.510 [INFO][3574] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37" host="localhost" Dec 13 14:18:27.542419 env[1222]: 2024-12-13 14:18:27.510 [INFO][3574] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:27.542419 env[1222]: 2024-12-13 14:18:27.510 [INFO][3574] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37" HandleID="k8s-pod-network.8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37" Workload="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0" Dec 13 14:18:27.542993 env[1222]: 2024-12-13 14:18:27.512 [INFO][3541] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37" Namespace="calico-system" Pod="calico-kube-controllers-7f9f6b67d6-5bs66" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0", GenerateName:"calico-kube-controllers-7f9f6b67d6-", Namespace:"calico-system", SelfLink:"", UID:"757821e6-5631-4cb2-8280-cc916fab5158", ResourceVersion:"818", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7f9f6b67d6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-7f9f6b67d6-5bs66", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3e36ebc54d6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:27.542993 env[1222]: 2024-12-13 14:18:27.512 [INFO][3541] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37" Namespace="calico-system" Pod="calico-kube-controllers-7f9f6b67d6-5bs66" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0" Dec 13 14:18:27.542993 env[1222]: 2024-12-13 14:18:27.512 [INFO][3541] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3e36ebc54d6 ContainerID="8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37" Namespace="calico-system" Pod="calico-kube-controllers-7f9f6b67d6-5bs66" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0" Dec 13 14:18:27.542993 env[1222]: 2024-12-13 14:18:27.521 [INFO][3541] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37" Namespace="calico-system" Pod="calico-kube-controllers-7f9f6b67d6-5bs66" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0" Dec 13 14:18:27.542993 env[1222]: 2024-12-13 14:18:27.521 [INFO][3541] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37" Namespace="calico-system" Pod="calico-kube-controllers-7f9f6b67d6-5bs66" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0", GenerateName:"calico-kube-controllers-7f9f6b67d6-", Namespace:"calico-system", SelfLink:"", UID:"757821e6-5631-4cb2-8280-cc916fab5158", ResourceVersion:"818", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7f9f6b67d6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37", Pod:"calico-kube-controllers-7f9f6b67d6-5bs66", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3e36ebc54d6", MAC:"6a:e6:0a:2b:3c:74", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:27.542993 env[1222]: 2024-12-13 14:18:27.539 [INFO][3541] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37" Namespace="calico-system" Pod="calico-kube-controllers-7f9f6b67d6-5bs66" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0" Dec 13 14:18:27.543000 audit[3597]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3597 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:18:27.543000 audit[3597]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffd2405e80 a2=0 a3=ffffbad32fa8 items=0 ppid=3186 pid=3597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.543000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:18:27.553103 env[1222]: time="2024-12-13T14:18:27.553027563Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:18:27.553103 env[1222]: time="2024-12-13T14:18:27.553068723Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:18:27.553103 env[1222]: time="2024-12-13T14:18:27.553079403Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:18:27.553275 env[1222]: time="2024-12-13T14:18:27.553208043Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37 pid=3616 runtime=io.containerd.runc.v2 Dec 13 14:18:27.564989 systemd[1]: Started cri-containerd-8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37.scope. Dec 13 14:18:27.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.596000 audit: BPF prog-id=158 op=LOAD Dec 13 14:18:27.596000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.596000 audit[3625]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3616 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863333233323861383034373734326166393736363366626237356162 Dec 13 14:18:27.596000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.596000 audit[3625]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3616 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863333233323861383034373734326166393736363366626237356162 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit: BPF prog-id=159 op=LOAD Dec 13 14:18:27.597000 audit[3625]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3616 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863333233323861383034373734326166393736363366626237356162 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit: BPF prog-id=160 op=LOAD Dec 13 14:18:27.597000 audit[3625]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3616 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863333233323861383034373734326166393736363366626237356162 Dec 13 14:18:27.597000 audit: BPF prog-id=160 op=UNLOAD Dec 13 14:18:27.597000 audit: BPF prog-id=159 op=UNLOAD Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.597000 audit: BPF prog-id=161 op=LOAD Dec 13 14:18:27.597000 audit[3625]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3616 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863333233323861383034373734326166393736363366626237356162 Dec 13 14:18:27.599202 systemd-resolved[1161]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:18:27.613805 systemd-networkd[1057]: cali14e4a6e24e6: Link UP Dec 13 14:18:27.615215 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali14e4a6e24e6: link becomes ready Dec 13 14:18:27.615670 systemd-networkd[1057]: cali14e4a6e24e6: Gained carrier Dec 13 14:18:27.632236 env[1222]: 2024-12-13 14:18:27.425 [INFO][3529] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0 calico-apiserver-6c989998dd- calico-apiserver d6f83580-b3c3-4c3b-b3a0-70e6a6f0d8c1 817 0 2024-12-13 14:18:04 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6c989998dd projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6c989998dd-kqlz6 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali14e4a6e24e6 [] []}} ContainerID="c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f" Namespace="calico-apiserver" Pod="calico-apiserver-6c989998dd-kqlz6" WorkloadEndpoint="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-" Dec 13 14:18:27.632236 env[1222]: 2024-12-13 14:18:27.425 [INFO][3529] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f" Namespace="calico-apiserver" Pod="calico-apiserver-6c989998dd-kqlz6" WorkloadEndpoint="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0" Dec 13 14:18:27.632236 env[1222]: 2024-12-13 14:18:27.459 [INFO][3569] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f" HandleID="k8s-pod-network.c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f" Workload="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0" Dec 13 14:18:27.632236 env[1222]: 2024-12-13 14:18:27.475 [INFO][3569] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f" HandleID="k8s-pod-network.c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f" Workload="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d8c90), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6c989998dd-kqlz6", "timestamp":"2024-12-13 14:18:27.459002095 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:18:27.632236 env[1222]: 2024-12-13 14:18:27.475 [INFO][3569] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:27.632236 env[1222]: 2024-12-13 14:18:27.510 [INFO][3569] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:27.632236 env[1222]: 2024-12-13 14:18:27.510 [INFO][3569] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:18:27.632236 env[1222]: 2024-12-13 14:18:27.577 [INFO][3569] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f" host="localhost" Dec 13 14:18:27.632236 env[1222]: 2024-12-13 14:18:27.584 [INFO][3569] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:18:27.632236 env[1222]: 2024-12-13 14:18:27.592 [INFO][3569] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:18:27.632236 env[1222]: 2024-12-13 14:18:27.594 [INFO][3569] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:18:27.632236 env[1222]: 2024-12-13 14:18:27.596 [INFO][3569] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:18:27.632236 env[1222]: 2024-12-13 14:18:27.596 [INFO][3569] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f" host="localhost" Dec 13 14:18:27.632236 env[1222]: 2024-12-13 14:18:27.599 [INFO][3569] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f Dec 13 14:18:27.632236 env[1222]: 2024-12-13 14:18:27.603 [INFO][3569] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f" host="localhost" Dec 13 14:18:27.632236 env[1222]: 2024-12-13 14:18:27.609 [INFO][3569] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f" host="localhost" Dec 13 14:18:27.632236 env[1222]: 2024-12-13 14:18:27.609 [INFO][3569] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f" host="localhost" Dec 13 14:18:27.632236 env[1222]: 2024-12-13 14:18:27.609 [INFO][3569] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:27.632236 env[1222]: 2024-12-13 14:18:27.609 [INFO][3569] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f" HandleID="k8s-pod-network.c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f" Workload="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0" Dec 13 14:18:27.632809 env[1222]: 2024-12-13 14:18:27.611 [INFO][3529] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f" Namespace="calico-apiserver" Pod="calico-apiserver-6c989998dd-kqlz6" WorkloadEndpoint="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0", GenerateName:"calico-apiserver-6c989998dd-", Namespace:"calico-apiserver", SelfLink:"", UID:"d6f83580-b3c3-4c3b-b3a0-70e6a6f0d8c1", ResourceVersion:"817", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c989998dd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6c989998dd-kqlz6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali14e4a6e24e6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:27.632809 env[1222]: 2024-12-13 14:18:27.611 [INFO][3529] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f" Namespace="calico-apiserver" Pod="calico-apiserver-6c989998dd-kqlz6" WorkloadEndpoint="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0" Dec 13 14:18:27.632809 env[1222]: 2024-12-13 14:18:27.611 [INFO][3529] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali14e4a6e24e6 ContainerID="c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f" Namespace="calico-apiserver" Pod="calico-apiserver-6c989998dd-kqlz6" WorkloadEndpoint="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0" Dec 13 14:18:27.632809 env[1222]: 2024-12-13 14:18:27.614 [INFO][3529] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f" Namespace="calico-apiserver" Pod="calico-apiserver-6c989998dd-kqlz6" WorkloadEndpoint="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0" Dec 13 14:18:27.632809 env[1222]: 2024-12-13 14:18:27.619 [INFO][3529] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f" Namespace="calico-apiserver" Pod="calico-apiserver-6c989998dd-kqlz6" WorkloadEndpoint="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0", GenerateName:"calico-apiserver-6c989998dd-", Namespace:"calico-apiserver", SelfLink:"", UID:"d6f83580-b3c3-4c3b-b3a0-70e6a6f0d8c1", ResourceVersion:"817", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c989998dd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f", Pod:"calico-apiserver-6c989998dd-kqlz6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali14e4a6e24e6", MAC:"ee:2f:25:d6:06:37", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:27.632809 env[1222]: 2024-12-13 14:18:27.628 [INFO][3529] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f" Namespace="calico-apiserver" Pod="calico-apiserver-6c989998dd-kqlz6" WorkloadEndpoint="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0" Dec 13 14:18:27.633064 env[1222]: time="2024-12-13T14:18:27.633027186Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7f9f6b67d6-5bs66,Uid:757821e6-5631-4cb2-8280-cc916fab5158,Namespace:calico-system,Attempt:1,} returns sandbox id \"8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37\"" Dec 13 14:18:27.638779 env[1222]: time="2024-12-13T14:18:27.638744548Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:18:27.640000 audit[3667]: NETFILTER_CFG table=filter:102 family=2 entries=44 op=nft_register_chain pid=3667 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:18:27.640000 audit[3667]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24680 a0=3 a1=fffff0fd8360 a2=0 a3=ffff7fbb5fa8 items=0 ppid=3186 pid=3667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.640000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:18:27.650673 env[1222]: time="2024-12-13T14:18:27.650611552Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:18:27.650789 env[1222]: time="2024-12-13T14:18:27.650658592Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:18:27.650789 env[1222]: time="2024-12-13T14:18:27.650672552Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:18:27.650876 env[1222]: time="2024-12-13T14:18:27.650796912Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f pid=3676 runtime=io.containerd.runc.v2 Dec 13 14:18:27.660872 systemd[1]: Started cri-containerd-c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f.scope. Dec 13 14:18:27.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.694000 audit: BPF prog-id=162 op=LOAD Dec 13 14:18:27.696000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.696000 audit[3685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3676 pid=3685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332363563653633393564373261633165396533633831323238393433 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3676 pid=3685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332363563653633393564373261633165396533633831323238393433 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit: BPF prog-id=163 op=LOAD Dec 13 14:18:27.698000 audit[3685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3676 pid=3685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332363563653633393564373261633165396533633831323238393433 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit: BPF prog-id=164 op=LOAD Dec 13 14:18:27.698000 audit[3685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3676 pid=3685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332363563653633393564373261633165396533633831323238393433 Dec 13 14:18:27.698000 audit: BPF prog-id=164 op=UNLOAD Dec 13 14:18:27.698000 audit: BPF prog-id=163 op=UNLOAD Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { perfmon } for pid=3685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit[3685]: AVC avc: denied { bpf } for pid=3685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.698000 audit: BPF prog-id=165 op=LOAD Dec 13 14:18:27.698000 audit[3685]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3676 pid=3685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332363563653633393564373261633165396533633831323238393433 Dec 13 14:18:27.699970 systemd-resolved[1161]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:18:27.712379 systemd-networkd[1057]: cali1133299c6e8: Link UP Dec 13 14:18:27.713664 systemd-networkd[1057]: cali1133299c6e8: Gained carrier Dec 13 14:18:27.714189 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1133299c6e8: link becomes ready Dec 13 14:18:27.726540 env[1222]: 2024-12-13 14:18:27.441 [INFO][3554] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--k7v25-eth0 coredns-6f6b679f8f- kube-system 37cabeba-c967-4ce9-8cc6-a2c93781d3be 819 0 2024-12-13 14:17:57 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-k7v25 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali1133299c6e8 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292" Namespace="kube-system" Pod="coredns-6f6b679f8f-k7v25" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--k7v25-" Dec 13 14:18:27.726540 env[1222]: 2024-12-13 14:18:27.441 [INFO][3554] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292" Namespace="kube-system" Pod="coredns-6f6b679f8f-k7v25" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--k7v25-eth0" Dec 13 14:18:27.726540 env[1222]: 2024-12-13 14:18:27.477 [INFO][3579] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292" HandleID="k8s-pod-network.e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292" Workload="localhost-k8s-coredns--6f6b679f8f--k7v25-eth0" Dec 13 14:18:27.726540 env[1222]: 2024-12-13 14:18:27.488 [INFO][3579] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292" HandleID="k8s-pod-network.e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292" Workload="localhost-k8s-coredns--6f6b679f8f--k7v25-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000123b70), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-k7v25", "timestamp":"2024-12-13 14:18:27.4775059 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:18:27.726540 env[1222]: 2024-12-13 14:18:27.488 [INFO][3579] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:27.726540 env[1222]: 2024-12-13 14:18:27.609 [INFO][3579] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:27.726540 env[1222]: 2024-12-13 14:18:27.609 [INFO][3579] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:18:27.726540 env[1222]: 2024-12-13 14:18:27.677 [INFO][3579] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292" host="localhost" Dec 13 14:18:27.726540 env[1222]: 2024-12-13 14:18:27.684 [INFO][3579] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:18:27.726540 env[1222]: 2024-12-13 14:18:27.689 [INFO][3579] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:18:27.726540 env[1222]: 2024-12-13 14:18:27.691 [INFO][3579] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:18:27.726540 env[1222]: 2024-12-13 14:18:27.693 [INFO][3579] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:18:27.726540 env[1222]: 2024-12-13 14:18:27.693 [INFO][3579] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292" host="localhost" Dec 13 14:18:27.726540 env[1222]: 2024-12-13 14:18:27.694 [INFO][3579] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292 Dec 13 14:18:27.726540 env[1222]: 2024-12-13 14:18:27.698 [INFO][3579] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292" host="localhost" Dec 13 14:18:27.726540 env[1222]: 2024-12-13 14:18:27.705 [INFO][3579] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292" host="localhost" Dec 13 14:18:27.726540 env[1222]: 2024-12-13 14:18:27.705 [INFO][3579] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292" host="localhost" Dec 13 14:18:27.726540 env[1222]: 2024-12-13 14:18:27.705 [INFO][3579] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:27.726540 env[1222]: 2024-12-13 14:18:27.705 [INFO][3579] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292" HandleID="k8s-pod-network.e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292" Workload="localhost-k8s-coredns--6f6b679f8f--k7v25-eth0" Dec 13 14:18:27.727066 env[1222]: 2024-12-13 14:18:27.707 [INFO][3554] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292" Namespace="kube-system" Pod="coredns-6f6b679f8f-k7v25" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--k7v25-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--k7v25-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"37cabeba-c967-4ce9-8cc6-a2c93781d3be", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 17, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-k7v25", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1133299c6e8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:27.727066 env[1222]: 2024-12-13 14:18:27.707 [INFO][3554] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292" Namespace="kube-system" Pod="coredns-6f6b679f8f-k7v25" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--k7v25-eth0" Dec 13 14:18:27.727066 env[1222]: 2024-12-13 14:18:27.707 [INFO][3554] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1133299c6e8 ContainerID="e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292" Namespace="kube-system" Pod="coredns-6f6b679f8f-k7v25" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--k7v25-eth0" Dec 13 14:18:27.727066 env[1222]: 2024-12-13 14:18:27.712 [INFO][3554] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292" Namespace="kube-system" Pod="coredns-6f6b679f8f-k7v25" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--k7v25-eth0" Dec 13 14:18:27.727066 env[1222]: 2024-12-13 14:18:27.713 [INFO][3554] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292" Namespace="kube-system" Pod="coredns-6f6b679f8f-k7v25" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--k7v25-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--k7v25-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"37cabeba-c967-4ce9-8cc6-a2c93781d3be", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 17, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292", Pod:"coredns-6f6b679f8f-k7v25", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1133299c6e8", MAC:"be:ac:45:44:64:d6", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:27.727066 env[1222]: 2024-12-13 14:18:27.723 [INFO][3554] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292" Namespace="kube-system" Pod="coredns-6f6b679f8f-k7v25" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--k7v25-eth0" Dec 13 14:18:27.733402 env[1222]: time="2024-12-13T14:18:27.733358776Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c989998dd-kqlz6,Uid:d6f83580-b3c3-4c3b-b3a0-70e6a6f0d8c1,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f\"" Dec 13 14:18:27.734000 audit[3726]: NETFILTER_CFG table=filter:103 family=2 entries=48 op=nft_register_chain pid=3726 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:18:27.734000 audit[3726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24376 a0=3 a1=ffffed1e4380 a2=0 a3=ffff9f1c4fa8 items=0 ppid=3186 pid=3726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.734000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:18:27.738943 env[1222]: time="2024-12-13T14:18:27.738858858Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:18:27.738943 env[1222]: time="2024-12-13T14:18:27.738902258Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:18:27.739077 env[1222]: time="2024-12-13T14:18:27.738938978Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:18:27.739246 env[1222]: time="2024-12-13T14:18:27.739203138Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292 pid=3734 runtime=io.containerd.runc.v2 Dec 13 14:18:27.749917 systemd[1]: Started cri-containerd-e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292.scope. Dec 13 14:18:27.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.772000 audit: BPF prog-id=166 op=LOAD Dec 13 14:18:27.772000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.772000 audit[3743]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3734 pid=3743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530313663623134303238383438636631386131613834373863383761 Dec 13 14:18:27.772000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.772000 audit[3743]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3734 pid=3743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530313663623134303238383438636631386131613834373863383761 Dec 13 14:18:27.773000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.773000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.773000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.773000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.773000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.773000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.773000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.773000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.773000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.773000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.773000 audit: BPF prog-id=167 op=LOAD Dec 13 14:18:27.773000 audit[3743]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3734 pid=3743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530313663623134303238383438636631386131613834373863383761 Dec 13 14:18:27.773000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.773000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.773000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.773000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.773000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.773000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.773000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.773000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.773000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.773000 audit: BPF prog-id=168 op=LOAD Dec 13 14:18:27.773000 audit[3743]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3734 pid=3743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530313663623134303238383438636631386131613834373863383761 Dec 13 14:18:27.774000 audit: BPF prog-id=168 op=UNLOAD Dec 13 14:18:27.774000 audit: BPF prog-id=167 op=UNLOAD Dec 13 14:18:27.774000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.774000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.774000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.774000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.774000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.774000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.774000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.774000 audit[3743]: AVC avc: denied { perfmon } for pid=3743 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.774000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.774000 audit[3743]: AVC avc: denied { bpf } for pid=3743 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.774000 audit: BPF prog-id=169 op=LOAD Dec 13 14:18:27.774000 audit[3743]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3734 pid=3743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530313663623134303238383438636631386131613834373863383761 Dec 13 14:18:27.776675 systemd-resolved[1161]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:18:27.794408 env[1222]: time="2024-12-13T14:18:27.794363674Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-k7v25,Uid:37cabeba-c967-4ce9-8cc6-a2c93781d3be,Namespace:kube-system,Attempt:1,} returns sandbox id \"e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292\"" Dec 13 14:18:27.795733 kubelet[1957]: E1213 14:18:27.795246 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:27.798408 env[1222]: time="2024-12-13T14:18:27.798359515Z" level=info msg="CreateContainer within sandbox \"e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:18:27.811214 env[1222]: time="2024-12-13T14:18:27.811170159Z" level=info msg="CreateContainer within sandbox \"e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"847a487286308e00caae9c574a74c74a83c7d447cf167d494557e1b8625c36ba\"" Dec 13 14:18:27.813972 env[1222]: time="2024-12-13T14:18:27.813869280Z" level=info msg="StartContainer for \"847a487286308e00caae9c574a74c74a83c7d447cf167d494557e1b8625c36ba\"" Dec 13 14:18:27.831456 systemd[1]: Started cri-containerd-847a487286308e00caae9c574a74c74a83c7d447cf167d494557e1b8625c36ba.scope. Dec 13 14:18:27.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit: BPF prog-id=170 op=LOAD Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3734 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834376134383732383633303865303063616165396335373461373463 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3734 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834376134383732383633303865303063616165396335373461373463 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit: BPF prog-id=171 op=LOAD Dec 13 14:18:27.850000 audit[3774]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3734 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834376134383732383633303865303063616165396335373461373463 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit: BPF prog-id=172 op=LOAD Dec 13 14:18:27.850000 audit[3774]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3734 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834376134383732383633303865303063616165396335373461373463 Dec 13 14:18:27.850000 audit: BPF prog-id=172 op=UNLOAD Dec 13 14:18:27.850000 audit: BPF prog-id=171 op=UNLOAD Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { perfmon } for pid=3774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit[3774]: AVC avc: denied { bpf } for pid=3774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:27.850000 audit: BPF prog-id=173 op=LOAD Dec 13 14:18:27.850000 audit[3774]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3734 pid=3774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834376134383732383633303865303063616165396335373461373463 Dec 13 14:18:27.865455 env[1222]: time="2024-12-13T14:18:27.865350135Z" level=info msg="StartContainer for \"847a487286308e00caae9c574a74c74a83c7d447cf167d494557e1b8625c36ba\" returns successfully" Dec 13 14:18:28.082887 env[1222]: time="2024-12-13T14:18:28.082850878Z" level=info msg="StopPodSandbox for \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\"" Dec 13 14:18:28.163661 env[1222]: 2024-12-13 14:18:28.128 [INFO][3822] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Dec 13 14:18:28.163661 env[1222]: 2024-12-13 14:18:28.129 [INFO][3822] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" iface="eth0" netns="/var/run/netns/cni-b81899e3-cf4c-6b37-2443-343f9461ae3d" Dec 13 14:18:28.163661 env[1222]: 2024-12-13 14:18:28.129 [INFO][3822] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" iface="eth0" netns="/var/run/netns/cni-b81899e3-cf4c-6b37-2443-343f9461ae3d" Dec 13 14:18:28.163661 env[1222]: 2024-12-13 14:18:28.129 [INFO][3822] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" iface="eth0" netns="/var/run/netns/cni-b81899e3-cf4c-6b37-2443-343f9461ae3d" Dec 13 14:18:28.163661 env[1222]: 2024-12-13 14:18:28.129 [INFO][3822] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Dec 13 14:18:28.163661 env[1222]: 2024-12-13 14:18:28.129 [INFO][3822] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Dec 13 14:18:28.163661 env[1222]: 2024-12-13 14:18:28.149 [INFO][3829] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" HandleID="k8s-pod-network.cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Workload="localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0" Dec 13 14:18:28.163661 env[1222]: 2024-12-13 14:18:28.149 [INFO][3829] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:28.163661 env[1222]: 2024-12-13 14:18:28.149 [INFO][3829] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:28.163661 env[1222]: 2024-12-13 14:18:28.158 [WARNING][3829] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" HandleID="k8s-pod-network.cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Workload="localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0" Dec 13 14:18:28.163661 env[1222]: 2024-12-13 14:18:28.158 [INFO][3829] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" HandleID="k8s-pod-network.cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Workload="localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0" Dec 13 14:18:28.163661 env[1222]: 2024-12-13 14:18:28.159 [INFO][3829] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:28.163661 env[1222]: 2024-12-13 14:18:28.161 [INFO][3822] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Dec 13 14:18:28.164304 env[1222]: time="2024-12-13T14:18:28.164260740Z" level=info msg="TearDown network for sandbox \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\" successfully" Dec 13 14:18:28.164410 env[1222]: time="2024-12-13T14:18:28.164390980Z" level=info msg="StopPodSandbox for \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\" returns successfully" Dec 13 14:18:28.165013 kubelet[1957]: E1213 14:18:28.164810 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:28.166407 env[1222]: time="2024-12-13T14:18:28.166337701Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-rxqcv,Uid:679e6bd2-1bda-4ac3-9dc1-b4d0e81bd8b9,Namespace:kube-system,Attempt:1,}" Dec 13 14:18:28.205659 kubelet[1957]: E1213 14:18:28.205329 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:28.232692 kubelet[1957]: I1213 14:18:28.231958 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-k7v25" podStartSLOduration=31.231937919 podStartE2EDuration="31.231937919s" podCreationTimestamp="2024-12-13 14:17:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:18:28.217531595 +0000 UTC m=+36.195993359" watchObservedRunningTime="2024-12-13 14:18:28.231937919 +0000 UTC m=+36.210399683" Dec 13 14:18:28.262000 audit[3861]: NETFILTER_CFG table=filter:104 family=2 entries=16 op=nft_register_rule pid=3861 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:28.262000 audit[3861]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffda2c0620 a2=0 a3=1 items=0 ppid=2108 pid=3861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:28.262000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:28.266000 audit[3861]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3861 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:28.266000 audit[3861]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffda2c0620 a2=0 a3=1 items=0 ppid=2108 pid=3861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:28.266000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:28.278000 audit[3863]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=3863 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:28.278000 audit[3863]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffcf6e5de0 a2=0 a3=1 items=0 ppid=2108 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:28.278000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:28.286000 audit[3863]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=3863 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:28.286000 audit[3863]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffcf6e5de0 a2=0 a3=1 items=0 ppid=2108 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:28.286000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:28.295971 systemd-networkd[1057]: cali2836b564324: Link UP Dec 13 14:18:28.297219 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2836b564324: link becomes ready Dec 13 14:18:28.297329 systemd-networkd[1057]: cali2836b564324: Gained carrier Dec 13 14:18:28.312393 env[1222]: 2024-12-13 14:18:28.212 [INFO][3837] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0 coredns-6f6b679f8f- kube-system 679e6bd2-1bda-4ac3-9dc1-b4d0e81bd8b9 840 0 2024-12-13 14:17:57 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-rxqcv eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2836b564324 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e" Namespace="kube-system" Pod="coredns-6f6b679f8f-rxqcv" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--rxqcv-" Dec 13 14:18:28.312393 env[1222]: 2024-12-13 14:18:28.212 [INFO][3837] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e" Namespace="kube-system" Pod="coredns-6f6b679f8f-rxqcv" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0" Dec 13 14:18:28.312393 env[1222]: 2024-12-13 14:18:28.255 [INFO][3850] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e" HandleID="k8s-pod-network.549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e" Workload="localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0" Dec 13 14:18:28.312393 env[1222]: 2024-12-13 14:18:28.267 [INFO][3850] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e" HandleID="k8s-pod-network.549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e" Workload="localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002a0ba0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-rxqcv", "timestamp":"2024-12-13 14:18:28.255648566 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:18:28.312393 env[1222]: 2024-12-13 14:18:28.267 [INFO][3850] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:28.312393 env[1222]: 2024-12-13 14:18:28.267 [INFO][3850] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:28.312393 env[1222]: 2024-12-13 14:18:28.267 [INFO][3850] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:18:28.312393 env[1222]: 2024-12-13 14:18:28.269 [INFO][3850] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e" host="localhost" Dec 13 14:18:28.312393 env[1222]: 2024-12-13 14:18:28.272 [INFO][3850] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:18:28.312393 env[1222]: 2024-12-13 14:18:28.277 [INFO][3850] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:18:28.312393 env[1222]: 2024-12-13 14:18:28.278 [INFO][3850] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:18:28.312393 env[1222]: 2024-12-13 14:18:28.281 [INFO][3850] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:18:28.312393 env[1222]: 2024-12-13 14:18:28.281 [INFO][3850] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e" host="localhost" Dec 13 14:18:28.312393 env[1222]: 2024-12-13 14:18:28.282 [INFO][3850] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e Dec 13 14:18:28.312393 env[1222]: 2024-12-13 14:18:28.285 [INFO][3850] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e" host="localhost" Dec 13 14:18:28.312393 env[1222]: 2024-12-13 14:18:28.291 [INFO][3850] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e" host="localhost" Dec 13 14:18:28.312393 env[1222]: 2024-12-13 14:18:28.291 [INFO][3850] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e" host="localhost" Dec 13 14:18:28.312393 env[1222]: 2024-12-13 14:18:28.291 [INFO][3850] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:28.312393 env[1222]: 2024-12-13 14:18:28.291 [INFO][3850] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e" HandleID="k8s-pod-network.549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e" Workload="localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0" Dec 13 14:18:28.312938 env[1222]: 2024-12-13 14:18:28.293 [INFO][3837] cni-plugin/k8s.go 386: Populated endpoint ContainerID="549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e" Namespace="kube-system" Pod="coredns-6f6b679f8f-rxqcv" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"679e6bd2-1bda-4ac3-9dc1-b4d0e81bd8b9", ResourceVersion:"840", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 17, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-rxqcv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2836b564324", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:28.312938 env[1222]: 2024-12-13 14:18:28.293 [INFO][3837] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e" Namespace="kube-system" Pod="coredns-6f6b679f8f-rxqcv" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0" Dec 13 14:18:28.312938 env[1222]: 2024-12-13 14:18:28.293 [INFO][3837] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2836b564324 ContainerID="549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e" Namespace="kube-system" Pod="coredns-6f6b679f8f-rxqcv" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0" Dec 13 14:18:28.312938 env[1222]: 2024-12-13 14:18:28.298 [INFO][3837] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e" Namespace="kube-system" Pod="coredns-6f6b679f8f-rxqcv" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0" Dec 13 14:18:28.312938 env[1222]: 2024-12-13 14:18:28.299 [INFO][3837] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e" Namespace="kube-system" Pod="coredns-6f6b679f8f-rxqcv" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"679e6bd2-1bda-4ac3-9dc1-b4d0e81bd8b9", ResourceVersion:"840", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 17, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e", Pod:"coredns-6f6b679f8f-rxqcv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2836b564324", MAC:"2e:1b:93:60:44:1d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:28.312938 env[1222]: 2024-12-13 14:18:28.308 [INFO][3837] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e" Namespace="kube-system" Pod="coredns-6f6b679f8f-rxqcv" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0" Dec 13 14:18:28.318000 audit[3880]: NETFILTER_CFG table=filter:108 family=2 entries=34 op=nft_register_chain pid=3880 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:18:28.318000 audit[3880]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18204 a0=3 a1=ffffd6bc2d40 a2=0 a3=ffffaf785fa8 items=0 ppid=3186 pid=3880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:28.318000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:18:28.325216 env[1222]: time="2024-12-13T14:18:28.325109545Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:18:28.325216 env[1222]: time="2024-12-13T14:18:28.325184225Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:18:28.325216 env[1222]: time="2024-12-13T14:18:28.325194985Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:18:28.325445 env[1222]: time="2024-12-13T14:18:28.325364145Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e pid=3889 runtime=io.containerd.runc.v2 Dec 13 14:18:28.335961 systemd[1]: Started cri-containerd-549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e.scope. Dec 13 14:18:28.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit: BPF prog-id=174 op=LOAD Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3889 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:28.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534396232323339633166306632626432323762353237623537323466 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3889 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:28.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534396232323339633166306632626432323762353237623537323466 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit: BPF prog-id=175 op=LOAD Dec 13 14:18:28.353000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3889 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:28.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534396232323339633166306632626432323762353237623537323466 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit: BPF prog-id=176 op=LOAD Dec 13 14:18:28.353000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3889 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:28.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534396232323339633166306632626432323762353237623537323466 Dec 13 14:18:28.353000 audit: BPF prog-id=176 op=UNLOAD Dec 13 14:18:28.353000 audit: BPF prog-id=175 op=UNLOAD Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { perfmon } for pid=3899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit[3899]: AVC avc: denied { bpf } for pid=3899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.353000 audit: BPF prog-id=177 op=LOAD Dec 13 14:18:28.353000 audit[3899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3889 pid=3899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:28.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534396232323339633166306632626432323762353237623537323466 Dec 13 14:18:28.355490 systemd-resolved[1161]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:18:28.361442 systemd[1]: run-netns-cni\x2db81899e3\x2dcf4c\x2d6b37\x2d2443\x2d343f9461ae3d.mount: Deactivated successfully. Dec 13 14:18:28.375347 env[1222]: time="2024-12-13T14:18:28.375302199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-rxqcv,Uid:679e6bd2-1bda-4ac3-9dc1-b4d0e81bd8b9,Namespace:kube-system,Attempt:1,} returns sandbox id \"549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e\"" Dec 13 14:18:28.376821 kubelet[1957]: E1213 14:18:28.376263 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:28.379888 env[1222]: time="2024-12-13T14:18:28.379853800Z" level=info msg="CreateContainer within sandbox \"549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:18:28.390337 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount741092317.mount: Deactivated successfully. Dec 13 14:18:28.390698 env[1222]: time="2024-12-13T14:18:28.390614243Z" level=info msg="CreateContainer within sandbox \"549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"3070a72a9ff98857b1b53302988bd07e9ce41fab1b71a193a51eab78ca1832e5\"" Dec 13 14:18:28.391186 env[1222]: time="2024-12-13T14:18:28.391074403Z" level=info msg="StartContainer for \"3070a72a9ff98857b1b53302988bd07e9ce41fab1b71a193a51eab78ca1832e5\"" Dec 13 14:18:28.408000 systemd[1]: Started cri-containerd-3070a72a9ff98857b1b53302988bd07e9ce41fab1b71a193a51eab78ca1832e5.scope. Dec 13 14:18:28.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.436000 audit: BPF prog-id=178 op=LOAD Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3889 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:28.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330373061373261396666393838353762316235333330323938386264 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3889 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:28.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330373061373261396666393838353762316235333330323938386264 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit: BPF prog-id=179 op=LOAD Dec 13 14:18:28.439000 audit[3928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3889 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:28.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330373061373261396666393838353762316235333330323938386264 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit: BPF prog-id=180 op=LOAD Dec 13 14:18:28.439000 audit[3928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3889 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:28.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330373061373261396666393838353762316235333330323938386264 Dec 13 14:18:28.439000 audit: BPF prog-id=180 op=UNLOAD Dec 13 14:18:28.439000 audit: BPF prog-id=179 op=UNLOAD Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { perfmon } for pid=3928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit[3928]: AVC avc: denied { bpf } for pid=3928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:28.439000 audit: BPF prog-id=181 op=LOAD Dec 13 14:18:28.439000 audit[3928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3889 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:28.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330373061373261396666393838353762316235333330323938386264 Dec 13 14:18:28.456638 env[1222]: time="2024-12-13T14:18:28.456535621Z" level=info msg="StartContainer for \"3070a72a9ff98857b1b53302988bd07e9ce41fab1b71a193a51eab78ca1832e5\" returns successfully" Dec 13 14:18:28.779260 systemd-networkd[1057]: cali14e4a6e24e6: Gained IPv6LL Dec 13 14:18:28.779544 systemd-networkd[1057]: cali3e36ebc54d6: Gained IPv6LL Dec 13 14:18:29.035298 systemd-networkd[1057]: cali1133299c6e8: Gained IPv6LL Dec 13 14:18:29.080431 env[1222]: time="2024-12-13T14:18:29.080386313Z" level=info msg="StopPodSandbox for \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\"" Dec 13 14:18:29.080692 env[1222]: time="2024-12-13T14:18:29.080640553Z" level=info msg="StopPodSandbox for \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\"" Dec 13 14:18:29.176246 env[1222]: 2024-12-13 14:18:29.137 [INFO][4000] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Dec 13 14:18:29.176246 env[1222]: 2024-12-13 14:18:29.137 [INFO][4000] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" iface="eth0" netns="/var/run/netns/cni-55bf8975-d167-c0ac-8e63-e75f967e3906" Dec 13 14:18:29.176246 env[1222]: 2024-12-13 14:18:29.137 [INFO][4000] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" iface="eth0" netns="/var/run/netns/cni-55bf8975-d167-c0ac-8e63-e75f967e3906" Dec 13 14:18:29.176246 env[1222]: 2024-12-13 14:18:29.137 [INFO][4000] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" iface="eth0" netns="/var/run/netns/cni-55bf8975-d167-c0ac-8e63-e75f967e3906" Dec 13 14:18:29.176246 env[1222]: 2024-12-13 14:18:29.137 [INFO][4000] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Dec 13 14:18:29.176246 env[1222]: 2024-12-13 14:18:29.137 [INFO][4000] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Dec 13 14:18:29.176246 env[1222]: 2024-12-13 14:18:29.162 [INFO][4009] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" HandleID="k8s-pod-network.78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Workload="localhost-k8s-csi--node--driver--5llpq-eth0" Dec 13 14:18:29.176246 env[1222]: 2024-12-13 14:18:29.163 [INFO][4009] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:29.176246 env[1222]: 2024-12-13 14:18:29.163 [INFO][4009] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:29.176246 env[1222]: 2024-12-13 14:18:29.171 [WARNING][4009] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" HandleID="k8s-pod-network.78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Workload="localhost-k8s-csi--node--driver--5llpq-eth0" Dec 13 14:18:29.176246 env[1222]: 2024-12-13 14:18:29.171 [INFO][4009] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" HandleID="k8s-pod-network.78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Workload="localhost-k8s-csi--node--driver--5llpq-eth0" Dec 13 14:18:29.176246 env[1222]: 2024-12-13 14:18:29.173 [INFO][4009] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:29.176246 env[1222]: 2024-12-13 14:18:29.174 [INFO][4000] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Dec 13 14:18:29.176910 env[1222]: time="2024-12-13T14:18:29.176364538Z" level=info msg="TearDown network for sandbox \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\" successfully" Dec 13 14:18:29.176910 env[1222]: time="2024-12-13T14:18:29.176396338Z" level=info msg="StopPodSandbox for \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\" returns successfully" Dec 13 14:18:29.177585 env[1222]: time="2024-12-13T14:18:29.177550178Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5llpq,Uid:29bb0d43-5e2c-4f1d-91bc-dc52da9da965,Namespace:calico-system,Attempt:1,}" Dec 13 14:18:29.208439 env[1222]: 2024-12-13 14:18:29.147 [INFO][3984] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Dec 13 14:18:29.208439 env[1222]: 2024-12-13 14:18:29.148 [INFO][3984] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" iface="eth0" netns="/var/run/netns/cni-54ac9b31-cfdb-04c5-9923-67de82c4005a" Dec 13 14:18:29.208439 env[1222]: 2024-12-13 14:18:29.149 [INFO][3984] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" iface="eth0" netns="/var/run/netns/cni-54ac9b31-cfdb-04c5-9923-67de82c4005a" Dec 13 14:18:29.208439 env[1222]: 2024-12-13 14:18:29.149 [INFO][3984] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" iface="eth0" netns="/var/run/netns/cni-54ac9b31-cfdb-04c5-9923-67de82c4005a" Dec 13 14:18:29.208439 env[1222]: 2024-12-13 14:18:29.149 [INFO][3984] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Dec 13 14:18:29.208439 env[1222]: 2024-12-13 14:18:29.149 [INFO][3984] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Dec 13 14:18:29.208439 env[1222]: 2024-12-13 14:18:29.189 [INFO][4014] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" HandleID="k8s-pod-network.e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Workload="localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0" Dec 13 14:18:29.208439 env[1222]: 2024-12-13 14:18:29.189 [INFO][4014] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:29.208439 env[1222]: 2024-12-13 14:18:29.189 [INFO][4014] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:29.208439 env[1222]: 2024-12-13 14:18:29.199 [WARNING][4014] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" HandleID="k8s-pod-network.e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Workload="localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0" Dec 13 14:18:29.208439 env[1222]: 2024-12-13 14:18:29.199 [INFO][4014] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" HandleID="k8s-pod-network.e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Workload="localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0" Dec 13 14:18:29.208439 env[1222]: 2024-12-13 14:18:29.200 [INFO][4014] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:29.208439 env[1222]: 2024-12-13 14:18:29.203 [INFO][3984] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Dec 13 14:18:29.208439 env[1222]: time="2024-12-13T14:18:29.207915066Z" level=info msg="TearDown network for sandbox \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\" successfully" Dec 13 14:18:29.208439 env[1222]: time="2024-12-13T14:18:29.207959866Z" level=info msg="StopPodSandbox for \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\" returns successfully" Dec 13 14:18:29.210225 env[1222]: time="2024-12-13T14:18:29.210086307Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c989998dd-99gmc,Uid:9d06110c-3d65-4ba2-a219-42723ec9b262,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:18:29.211757 kubelet[1957]: E1213 14:18:29.211309 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:29.213296 kubelet[1957]: E1213 14:18:29.212232 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:29.232874 kubelet[1957]: I1213 14:18:29.232790 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-rxqcv" podStartSLOduration=32.232770473 podStartE2EDuration="32.232770473s" podCreationTimestamp="2024-12-13 14:17:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:18:29.22349699 +0000 UTC m=+37.201958754" watchObservedRunningTime="2024-12-13 14:18:29.232770473 +0000 UTC m=+37.211232237" Dec 13 14:18:29.277000 audit[4049]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:29.277000 audit[4049]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffe71b2ae0 a2=0 a3=1 items=0 ppid=2108 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.277000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:29.282000 audit[4049]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=4049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:29.282000 audit[4049]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffe71b2ae0 a2=0 a3=1 items=0 ppid=2108 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.282000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:29.358231 systemd[1]: run-containerd-runc-k8s.io-3070a72a9ff98857b1b53302988bd07e9ce41fab1b71a193a51eab78ca1832e5-runc.6LSJbP.mount: Deactivated successfully. Dec 13 14:18:29.358323 systemd[1]: run-netns-cni\x2d55bf8975\x2dd167\x2dc0ac\x2d8e63\x2de75f967e3906.mount: Deactivated successfully. Dec 13 14:18:29.358378 systemd[1]: run-netns-cni\x2d54ac9b31\x2dcfdb\x2d04c5\x2d9923\x2d67de82c4005a.mount: Deactivated successfully. Dec 13 14:18:29.361227 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2fa80e91929: link becomes ready Dec 13 14:18:29.365462 systemd-networkd[1057]: cali2fa80e91929: Link UP Dec 13 14:18:29.365611 systemd-networkd[1057]: cali2fa80e91929: Gained carrier Dec 13 14:18:29.372284 env[1222]: 2024-12-13 14:18:29.244 [INFO][4023] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--5llpq-eth0 csi-node-driver- calico-system 29bb0d43-5e2c-4f1d-91bc-dc52da9da965 865 0 2024-12-13 14:18:04 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-5llpq eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali2fa80e91929 [] []}} ContainerID="4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd" Namespace="calico-system" Pod="csi-node-driver-5llpq" WorkloadEndpoint="localhost-k8s-csi--node--driver--5llpq-" Dec 13 14:18:29.372284 env[1222]: 2024-12-13 14:18:29.245 [INFO][4023] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd" Namespace="calico-system" Pod="csi-node-driver-5llpq" WorkloadEndpoint="localhost-k8s-csi--node--driver--5llpq-eth0" Dec 13 14:18:29.372284 env[1222]: 2024-12-13 14:18:29.313 [INFO][4050] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd" HandleID="k8s-pod-network.4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd" Workload="localhost-k8s-csi--node--driver--5llpq-eth0" Dec 13 14:18:29.372284 env[1222]: 2024-12-13 14:18:29.325 [INFO][4050] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd" HandleID="k8s-pod-network.4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd" Workload="localhost-k8s-csi--node--driver--5llpq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002f4dd0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-5llpq", "timestamp":"2024-12-13 14:18:29.313811654 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:18:29.372284 env[1222]: 2024-12-13 14:18:29.325 [INFO][4050] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:29.372284 env[1222]: 2024-12-13 14:18:29.325 [INFO][4050] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:29.372284 env[1222]: 2024-12-13 14:18:29.325 [INFO][4050] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:18:29.372284 env[1222]: 2024-12-13 14:18:29.327 [INFO][4050] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd" host="localhost" Dec 13 14:18:29.372284 env[1222]: 2024-12-13 14:18:29.331 [INFO][4050] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:18:29.372284 env[1222]: 2024-12-13 14:18:29.335 [INFO][4050] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:18:29.372284 env[1222]: 2024-12-13 14:18:29.336 [INFO][4050] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:18:29.372284 env[1222]: 2024-12-13 14:18:29.339 [INFO][4050] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:18:29.372284 env[1222]: 2024-12-13 14:18:29.339 [INFO][4050] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd" host="localhost" Dec 13 14:18:29.372284 env[1222]: 2024-12-13 14:18:29.340 [INFO][4050] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd Dec 13 14:18:29.372284 env[1222]: 2024-12-13 14:18:29.344 [INFO][4050] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd" host="localhost" Dec 13 14:18:29.372284 env[1222]: 2024-12-13 14:18:29.351 [INFO][4050] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd" host="localhost" Dec 13 14:18:29.372284 env[1222]: 2024-12-13 14:18:29.351 [INFO][4050] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd" host="localhost" Dec 13 14:18:29.372284 env[1222]: 2024-12-13 14:18:29.351 [INFO][4050] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:29.372284 env[1222]: 2024-12-13 14:18:29.351 [INFO][4050] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd" HandleID="k8s-pod-network.4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd" Workload="localhost-k8s-csi--node--driver--5llpq-eth0" Dec 13 14:18:29.372839 env[1222]: 2024-12-13 14:18:29.356 [INFO][4023] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd" Namespace="calico-system" Pod="csi-node-driver-5llpq" WorkloadEndpoint="localhost-k8s-csi--node--driver--5llpq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--5llpq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"29bb0d43-5e2c-4f1d-91bc-dc52da9da965", ResourceVersion:"865", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-5llpq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2fa80e91929", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:29.372839 env[1222]: 2024-12-13 14:18:29.356 [INFO][4023] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd" Namespace="calico-system" Pod="csi-node-driver-5llpq" WorkloadEndpoint="localhost-k8s-csi--node--driver--5llpq-eth0" Dec 13 14:18:29.372839 env[1222]: 2024-12-13 14:18:29.356 [INFO][4023] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2fa80e91929 ContainerID="4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd" Namespace="calico-system" Pod="csi-node-driver-5llpq" WorkloadEndpoint="localhost-k8s-csi--node--driver--5llpq-eth0" Dec 13 14:18:29.372839 env[1222]: 2024-12-13 14:18:29.357 [INFO][4023] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd" Namespace="calico-system" Pod="csi-node-driver-5llpq" WorkloadEndpoint="localhost-k8s-csi--node--driver--5llpq-eth0" Dec 13 14:18:29.372839 env[1222]: 2024-12-13 14:18:29.357 [INFO][4023] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd" Namespace="calico-system" Pod="csi-node-driver-5llpq" WorkloadEndpoint="localhost-k8s-csi--node--driver--5llpq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--5llpq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"29bb0d43-5e2c-4f1d-91bc-dc52da9da965", ResourceVersion:"865", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd", Pod:"csi-node-driver-5llpq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2fa80e91929", MAC:"3a:61:9d:c6:1e:49", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:29.372839 env[1222]: 2024-12-13 14:18:29.368 [INFO][4023] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd" Namespace="calico-system" Pod="csi-node-driver-5llpq" WorkloadEndpoint="localhost-k8s-csi--node--driver--5llpq-eth0" Dec 13 14:18:29.383000 audit[4078]: NETFILTER_CFG table=filter:111 family=2 entries=48 op=nft_register_chain pid=4078 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:18:29.383000 audit[4078]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23852 a0=3 a1=ffffd880ead0 a2=0 a3=ffff89f6dfa8 items=0 ppid=3186 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.383000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:18:29.388973 env[1222]: time="2024-12-13T14:18:29.388900713Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:18:29.389090 env[1222]: time="2024-12-13T14:18:29.388985793Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:18:29.389090 env[1222]: time="2024-12-13T14:18:29.389012073Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:18:29.389244 env[1222]: time="2024-12-13T14:18:29.389202913Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd pid=4087 runtime=io.containerd.runc.v2 Dec 13 14:18:29.407049 systemd[1]: Started cri-containerd-4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd.scope. Dec 13 14:18:29.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit: BPF prog-id=182 op=LOAD Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4087 pid=4098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465626163323261383237616264633032613764636635316466303463 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4087 pid=4098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465626163323261383237616264633032613764636635316466303463 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit: BPF prog-id=183 op=LOAD Dec 13 14:18:29.453000 audit[4098]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4087 pid=4098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465626163323261383237616264633032613764636635316466303463 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit: BPF prog-id=184 op=LOAD Dec 13 14:18:29.453000 audit[4098]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4087 pid=4098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465626163323261383237616264633032613764636635316466303463 Dec 13 14:18:29.453000 audit: BPF prog-id=184 op=UNLOAD Dec 13 14:18:29.453000 audit: BPF prog-id=183 op=UNLOAD Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { perfmon } for pid=4098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit[4098]: AVC avc: denied { bpf } for pid=4098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.453000 audit: BPF prog-id=185 op=LOAD Dec 13 14:18:29.453000 audit[4098]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4087 pid=4098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465626163323261383237616264633032613764636635316466303463 Dec 13 14:18:29.455900 systemd-resolved[1161]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:18:29.479262 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali76dc8863fc1: link becomes ready Dec 13 14:18:29.479228 systemd-networkd[1057]: cali76dc8863fc1: Link UP Dec 13 14:18:29.479422 systemd-networkd[1057]: cali76dc8863fc1: Gained carrier Dec 13 14:18:29.490318 env[1222]: time="2024-12-13T14:18:29.490273140Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5llpq,Uid:29bb0d43-5e2c-4f1d-91bc-dc52da9da965,Namespace:calico-system,Attempt:1,} returns sandbox id \"4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd\"" Dec 13 14:18:29.493221 env[1222]: 2024-12-13 14:18:29.310 [INFO][4038] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0 calico-apiserver-6c989998dd- calico-apiserver 9d06110c-3d65-4ba2-a219-42723ec9b262 866 0 2024-12-13 14:18:04 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6c989998dd projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6c989998dd-99gmc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali76dc8863fc1 [] []}} ContainerID="158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2" Namespace="calico-apiserver" Pod="calico-apiserver-6c989998dd-99gmc" WorkloadEndpoint="localhost-k8s-calico--apiserver--6c989998dd--99gmc-" Dec 13 14:18:29.493221 env[1222]: 2024-12-13 14:18:29.311 [INFO][4038] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2" Namespace="calico-apiserver" Pod="calico-apiserver-6c989998dd-99gmc" WorkloadEndpoint="localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0" Dec 13 14:18:29.493221 env[1222]: 2024-12-13 14:18:29.348 [INFO][4060] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2" HandleID="k8s-pod-network.158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2" Workload="localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0" Dec 13 14:18:29.493221 env[1222]: 2024-12-13 14:18:29.428 [INFO][4060] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2" HandleID="k8s-pod-network.158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2" Workload="localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000396870), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6c989998dd-99gmc", "timestamp":"2024-12-13 14:18:29.348858263 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:18:29.493221 env[1222]: 2024-12-13 14:18:29.429 [INFO][4060] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:29.493221 env[1222]: 2024-12-13 14:18:29.429 [INFO][4060] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:29.493221 env[1222]: 2024-12-13 14:18:29.429 [INFO][4060] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:18:29.493221 env[1222]: 2024-12-13 14:18:29.433 [INFO][4060] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2" host="localhost" Dec 13 14:18:29.493221 env[1222]: 2024-12-13 14:18:29.439 [INFO][4060] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:18:29.493221 env[1222]: 2024-12-13 14:18:29.445 [INFO][4060] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:18:29.493221 env[1222]: 2024-12-13 14:18:29.447 [INFO][4060] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:18:29.493221 env[1222]: 2024-12-13 14:18:29.453 [INFO][4060] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:18:29.493221 env[1222]: 2024-12-13 14:18:29.453 [INFO][4060] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2" host="localhost" Dec 13 14:18:29.493221 env[1222]: 2024-12-13 14:18:29.461 [INFO][4060] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2 Dec 13 14:18:29.493221 env[1222]: 2024-12-13 14:18:29.465 [INFO][4060] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2" host="localhost" Dec 13 14:18:29.493221 env[1222]: 2024-12-13 14:18:29.473 [INFO][4060] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2" host="localhost" Dec 13 14:18:29.493221 env[1222]: 2024-12-13 14:18:29.473 [INFO][4060] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2" host="localhost" Dec 13 14:18:29.493221 env[1222]: 2024-12-13 14:18:29.473 [INFO][4060] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:29.493221 env[1222]: 2024-12-13 14:18:29.473 [INFO][4060] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2" HandleID="k8s-pod-network.158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2" Workload="localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0" Dec 13 14:18:29.493748 env[1222]: 2024-12-13 14:18:29.476 [INFO][4038] cni-plugin/k8s.go 386: Populated endpoint ContainerID="158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2" Namespace="calico-apiserver" Pod="calico-apiserver-6c989998dd-99gmc" WorkloadEndpoint="localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0", GenerateName:"calico-apiserver-6c989998dd-", Namespace:"calico-apiserver", SelfLink:"", UID:"9d06110c-3d65-4ba2-a219-42723ec9b262", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c989998dd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6c989998dd-99gmc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali76dc8863fc1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:29.493748 env[1222]: 2024-12-13 14:18:29.476 [INFO][4038] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2" Namespace="calico-apiserver" Pod="calico-apiserver-6c989998dd-99gmc" WorkloadEndpoint="localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0" Dec 13 14:18:29.493748 env[1222]: 2024-12-13 14:18:29.476 [INFO][4038] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali76dc8863fc1 ContainerID="158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2" Namespace="calico-apiserver" Pod="calico-apiserver-6c989998dd-99gmc" WorkloadEndpoint="localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0" Dec 13 14:18:29.493748 env[1222]: 2024-12-13 14:18:29.479 [INFO][4038] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2" Namespace="calico-apiserver" Pod="calico-apiserver-6c989998dd-99gmc" WorkloadEndpoint="localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0" Dec 13 14:18:29.493748 env[1222]: 2024-12-13 14:18:29.480 [INFO][4038] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2" Namespace="calico-apiserver" Pod="calico-apiserver-6c989998dd-99gmc" WorkloadEndpoint="localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0", GenerateName:"calico-apiserver-6c989998dd-", Namespace:"calico-apiserver", SelfLink:"", UID:"9d06110c-3d65-4ba2-a219-42723ec9b262", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c989998dd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2", Pod:"calico-apiserver-6c989998dd-99gmc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali76dc8863fc1", MAC:"06:d0:31:f8:62:6c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:29.493748 env[1222]: 2024-12-13 14:18:29.488 [INFO][4038] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2" Namespace="calico-apiserver" Pod="calico-apiserver-6c989998dd-99gmc" WorkloadEndpoint="localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0" Dec 13 14:18:29.500000 audit[4135]: NETFILTER_CFG table=filter:112 family=2 entries=42 op=nft_register_chain pid=4135 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:18:29.500000 audit[4135]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22672 a0=3 a1=ffffc3328b20 a2=0 a3=ffffb826ffa8 items=0 ppid=3186 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.500000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:18:29.510006 env[1222]: time="2024-12-13T14:18:29.509942505Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:18:29.510117 env[1222]: time="2024-12-13T14:18:29.509986425Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:18:29.510117 env[1222]: time="2024-12-13T14:18:29.509997025Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:18:29.510284 env[1222]: time="2024-12-13T14:18:29.510238465Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2 pid=4143 runtime=io.containerd.runc.v2 Dec 13 14:18:29.524794 systemd[1]: Started cri-containerd-158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2.scope. Dec 13 14:18:29.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.572000 audit: BPF prog-id=186 op=LOAD Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4143 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135386464666134393537653661336637356664646537393862396364 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4143 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135386464666134393537653661336637356664646537393862396364 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit: BPF prog-id=187 op=LOAD Dec 13 14:18:29.573000 audit[4154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4143 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135386464666134393537653661336637356664646537393862396364 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit: BPF prog-id=188 op=LOAD Dec 13 14:18:29.573000 audit[4154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4143 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135386464666134393537653661336637356664646537393862396364 Dec 13 14:18:29.573000 audit: BPF prog-id=188 op=UNLOAD Dec 13 14:18:29.573000 audit: BPF prog-id=187 op=UNLOAD Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.573000 audit: BPF prog-id=189 op=LOAD Dec 13 14:18:29.573000 audit[4154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4143 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135386464666134393537653661336637356664646537393862396364 Dec 13 14:18:29.575454 systemd-resolved[1161]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:18:29.591643 env[1222]: time="2024-12-13T14:18:29.591599406Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6c989998dd-99gmc,Uid:9d06110c-3d65-4ba2-a219-42723ec9b262,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2\"" Dec 13 14:18:29.769551 env[1222]: time="2024-12-13T14:18:29.769439372Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:29.772577 env[1222]: time="2024-12-13T14:18:29.772486813Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:32c335fdb9d757e7ba6a76a9cfa8d292a5a229101ae7ea37b42f53c28adf2db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:29.774292 env[1222]: time="2024-12-13T14:18:29.774259373Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:29.775971 env[1222]: time="2024-12-13T14:18:29.775934014Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:29.776513 env[1222]: time="2024-12-13T14:18:29.776483774Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:32c335fdb9d757e7ba6a76a9cfa8d292a5a229101ae7ea37b42f53c28adf2db1\"" Dec 13 14:18:29.777967 env[1222]: time="2024-12-13T14:18:29.777939534Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:18:29.783862 env[1222]: time="2024-12-13T14:18:29.783827856Z" level=info msg="CreateContainer within sandbox \"8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:18:29.793634 env[1222]: time="2024-12-13T14:18:29.793599819Z" level=info msg="CreateContainer within sandbox \"8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"ce677f7c05367341646203de60e681c13c304f3f47ca898bc28527c316c9dc49\"" Dec 13 14:18:29.794187 env[1222]: time="2024-12-13T14:18:29.794101859Z" level=info msg="StartContainer for \"ce677f7c05367341646203de60e681c13c304f3f47ca898bc28527c316c9dc49\"" Dec 13 14:18:29.810360 systemd[1]: Started cri-containerd-ce677f7c05367341646203de60e681c13c304f3f47ca898bc28527c316c9dc49.scope. Dec 13 14:18:29.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit: BPF prog-id=190 op=LOAD Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3616 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365363737663763303533363733343136343632303364653630653638 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3616 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365363737663763303533363733343136343632303364653630653638 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit: BPF prog-id=191 op=LOAD Dec 13 14:18:29.830000 audit[4186]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3616 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365363737663763303533363733343136343632303364653630653638 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit: BPF prog-id=192 op=LOAD Dec 13 14:18:29.830000 audit[4186]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3616 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365363737663763303533363733343136343632303364653630653638 Dec 13 14:18:29.830000 audit: BPF prog-id=192 op=UNLOAD Dec 13 14:18:29.830000 audit: BPF prog-id=191 op=UNLOAD Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { perfmon } for pid=4186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit[4186]: AVC avc: denied { bpf } for pid=4186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:29.830000 audit: BPF prog-id=193 op=LOAD Dec 13 14:18:29.830000 audit[4186]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3616 pid=4186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365363737663763303533363733343136343632303364653630653638 Dec 13 14:18:29.857291 env[1222]: time="2024-12-13T14:18:29.857223555Z" level=info msg="StartContainer for \"ce677f7c05367341646203de60e681c13c304f3f47ca898bc28527c316c9dc49\" returns successfully" Dec 13 14:18:30.059244 systemd-networkd[1057]: cali2836b564324: Gained IPv6LL Dec 13 14:18:30.220944 kubelet[1957]: E1213 14:18:30.220906 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:30.221393 kubelet[1957]: E1213 14:18:30.221373 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:30.234182 kubelet[1957]: I1213 14:18:30.229286 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7f9f6b67d6-5bs66" podStartSLOduration=24.089010942 podStartE2EDuration="26.229272208s" podCreationTimestamp="2024-12-13 14:18:04 +0000 UTC" firstStartedPulling="2024-12-13 14:18:27.637317348 +0000 UTC m=+35.615779112" lastFinishedPulling="2024-12-13 14:18:29.777578614 +0000 UTC m=+37.756040378" observedRunningTime="2024-12-13 14:18:30.228968008 +0000 UTC m=+38.207429772" watchObservedRunningTime="2024-12-13 14:18:30.229272208 +0000 UTC m=+38.207733972" Dec 13 14:18:30.296000 audit[4239]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:30.296000 audit[4239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffc75961f0 a2=0 a3=1 items=0 ppid=2108 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:30.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:30.307000 audit[4239]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=4239 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:30.307000 audit[4239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffc75961f0 a2=0 a3=1 items=0 ppid=2108 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:30.307000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:30.571264 systemd-networkd[1057]: cali2fa80e91929: Gained IPv6LL Dec 13 14:18:31.147267 systemd-networkd[1057]: cali76dc8863fc1: Gained IPv6LL Dec 13 14:18:31.222898 kubelet[1957]: E1213 14:18:31.222862 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:31.513210 systemd[1]: Started sshd@9-10.0.0.118:22-10.0.0.1:48810.service. Dec 13 14:18:31.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.118:22-10.0.0.1:48810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:31.516203 kernel: kauditd_printk_skb: 556 callbacks suppressed Dec 13 14:18:31.516299 kernel: audit: type=1130 audit(1734099511.512:1311): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.118:22-10.0.0.1:48810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:31.560000 audit[4248]: USER_ACCT pid=4248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:31.561596 sshd[4248]: Accepted publickey for core from 10.0.0.1 port 48810 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:18:31.564217 kernel: audit: type=1101 audit(1734099511.560:1312): pid=4248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:31.563000 audit[4248]: CRED_ACQ pid=4248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:31.567009 sshd[4248]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:31.568180 kernel: audit: type=1103 audit(1734099511.563:1313): pid=4248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:31.568240 kernel: audit: type=1006 audit(1734099511.563:1314): pid=4248 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 14:18:31.568261 kernel: audit: type=1300 audit(1734099511.563:1314): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb047ec0 a2=3 a3=1 items=0 ppid=1 pid=4248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:31.563000 audit[4248]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb047ec0 a2=3 a3=1 items=0 ppid=1 pid=4248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:31.570478 kernel: audit: type=1327 audit(1734099511.563:1314): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:31.563000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:31.575568 systemd[1]: Started session-10.scope. Dec 13 14:18:31.575923 systemd-logind[1210]: New session 10 of user core. Dec 13 14:18:31.578000 audit[4248]: USER_START pid=4248 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:31.582276 kernel: audit: type=1105 audit(1734099511.578:1315): pid=4248 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:31.581000 audit[4250]: CRED_ACQ pid=4250 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:31.585219 kernel: audit: type=1103 audit(1734099511.581:1316): pid=4250 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:31.755057 env[1222]: time="2024-12-13T14:18:31.755001728Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:31.757790 env[1222]: time="2024-12-13T14:18:31.757749449Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:31.760215 env[1222]: time="2024-12-13T14:18:31.760183090Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:31.761404 env[1222]: time="2024-12-13T14:18:31.761379570Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:31.761840 env[1222]: time="2024-12-13T14:18:31.761811690Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c\"" Dec 13 14:18:31.763767 env[1222]: time="2024-12-13T14:18:31.763692490Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:18:31.764695 env[1222]: time="2024-12-13T14:18:31.764657811Z" level=info msg="CreateContainer within sandbox \"c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:18:31.796441 env[1222]: time="2024-12-13T14:18:31.796388898Z" level=info msg="CreateContainer within sandbox \"c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"d2b33850e0e6d9fdcf4b90a823363bc6719f76339a6f539a1d0b8ae56377d4ad\"" Dec 13 14:18:31.798571 env[1222]: time="2024-12-13T14:18:31.798517378Z" level=info msg="StartContainer for \"d2b33850e0e6d9fdcf4b90a823363bc6719f76339a6f539a1d0b8ae56377d4ad\"" Dec 13 14:18:31.827750 sshd[4248]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:31.827000 audit[4248]: USER_END pid=4248 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:31.827000 audit[4248]: CRED_DISP pid=4248 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:31.834198 kernel: audit: type=1106 audit(1734099511.827:1317): pid=4248 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:31.834301 kernel: audit: type=1104 audit(1734099511.827:1318): pid=4248 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:31.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.118:22-10.0.0.1:48810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:31.833577 systemd[1]: sshd@9-10.0.0.118:22-10.0.0.1:48810.service: Deactivated successfully. Dec 13 14:18:31.834375 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:18:31.837833 systemd-logind[1210]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:18:31.838670 systemd[1]: Started cri-containerd-d2b33850e0e6d9fdcf4b90a823363bc6719f76339a6f539a1d0b8ae56377d4ad.scope. Dec 13 14:18:31.840280 systemd[1]: Started sshd@10-10.0.0.118:22-10.0.0.1:48820.service. Dec 13 14:18:31.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.118:22-10.0.0.1:48820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:31.841725 systemd-logind[1210]: Removed session 10. Dec 13 14:18:31.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.873000 audit: BPF prog-id=194 op=LOAD Dec 13 14:18:31.873000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.873000 audit[4268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3676 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:31.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432623333383530653065366439666463663462393061383233333633 Dec 13 14:18:31.873000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.873000 audit[4268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3676 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:31.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432623333383530653065366439666463663462393061383233333633 Dec 13 14:18:31.873000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.873000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.873000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.873000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.873000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.873000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.873000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.873000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.873000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.873000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.873000 audit: BPF prog-id=195 op=LOAD Dec 13 14:18:31.873000 audit[4268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3676 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:31.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432623333383530653065366439666463663462393061383233333633 Dec 13 14:18:31.874000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.874000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.874000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.874000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.874000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.874000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.874000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.874000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.874000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.874000 audit: BPF prog-id=196 op=LOAD Dec 13 14:18:31.874000 audit[4268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3676 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:31.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432623333383530653065366439666463663462393061383233333633 Dec 13 14:18:31.875000 audit: BPF prog-id=196 op=UNLOAD Dec 13 14:18:31.875000 audit: BPF prog-id=195 op=UNLOAD Dec 13 14:18:31.875000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.875000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.875000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.875000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.875000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.875000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.875000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.875000 audit[4268]: AVC avc: denied { perfmon } for pid=4268 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.875000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.875000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:31.875000 audit: BPF prog-id=197 op=LOAD Dec 13 14:18:31.875000 audit[4268]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3676 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:31.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432623333383530653065366439666463663462393061383233333633 Dec 13 14:18:31.877000 audit[4280]: USER_ACCT pid=4280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:31.879057 sshd[4280]: Accepted publickey for core from 10.0.0.1 port 48820 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:18:31.879000 audit[4280]: CRED_ACQ pid=4280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:31.879000 audit[4280]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee007c50 a2=3 a3=1 items=0 ppid=1 pid=4280 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:31.879000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:31.880766 sshd[4280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:31.884253 systemd-logind[1210]: New session 11 of user core. Dec 13 14:18:31.885078 systemd[1]: Started session-11.scope. Dec 13 14:18:31.887000 audit[4280]: USER_START pid=4280 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:31.889000 audit[4288]: CRED_ACQ pid=4288 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:31.909283 env[1222]: time="2024-12-13T14:18:31.909226284Z" level=info msg="StartContainer for \"d2b33850e0e6d9fdcf4b90a823363bc6719f76339a6f539a1d0b8ae56377d4ad\" returns successfully" Dec 13 14:18:32.070369 sshd[4280]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:32.070000 audit[4280]: USER_END pid=4280 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:32.070000 audit[4280]: CRED_DISP pid=4280 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:32.075607 systemd[1]: Started sshd@11-10.0.0.118:22-10.0.0.1:48822.service. Dec 13 14:18:32.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.118:22-10.0.0.1:48822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:32.077492 systemd[1]: sshd@10-10.0.0.118:22-10.0.0.1:48820.service: Deactivated successfully. Dec 13 14:18:32.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.118:22-10.0.0.1:48820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:32.078165 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:18:32.078763 systemd-logind[1210]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:18:32.081590 systemd-logind[1210]: Removed session 11. Dec 13 14:18:32.117000 audit[4311]: USER_ACCT pid=4311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:32.118497 sshd[4311]: Accepted publickey for core from 10.0.0.1 port 48822 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:18:32.118000 audit[4311]: CRED_ACQ pid=4311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:32.118000 audit[4311]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffaace360 a2=3 a3=1 items=0 ppid=1 pid=4311 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:32.118000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:32.119616 sshd[4311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:32.122945 systemd-logind[1210]: New session 12 of user core. Dec 13 14:18:32.123788 systemd[1]: Started session-12.scope. Dec 13 14:18:32.126000 audit[4311]: USER_START pid=4311 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:32.127000 audit[4314]: CRED_ACQ pid=4314 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:32.237019 kubelet[1957]: I1213 14:18:32.236953 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6c989998dd-kqlz6" podStartSLOduration=24.208744561 podStartE2EDuration="28.236921875s" podCreationTimestamp="2024-12-13 14:18:04 +0000 UTC" firstStartedPulling="2024-12-13 14:18:27.734625816 +0000 UTC m=+35.713087540" lastFinishedPulling="2024-12-13 14:18:31.76280309 +0000 UTC m=+39.741264854" observedRunningTime="2024-12-13 14:18:32.236029635 +0000 UTC m=+40.214491399" watchObservedRunningTime="2024-12-13 14:18:32.236921875 +0000 UTC m=+40.215383639" Dec 13 14:18:32.249000 audit[4324]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4324 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:32.249000 audit[4324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffe6ae0ad0 a2=0 a3=1 items=0 ppid=2108 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:32.249000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:32.253000 audit[4324]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4324 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:32.253000 audit[4324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe6ae0ad0 a2=0 a3=1 items=0 ppid=2108 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:32.253000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:32.295078 sshd[4311]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:32.296000 audit[4311]: USER_END pid=4311 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:32.296000 audit[4311]: CRED_DISP pid=4311 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:32.298931 systemd[1]: sshd@11-10.0.0.118:22-10.0.0.1:48822.service: Deactivated successfully. Dec 13 14:18:32.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.118:22-10.0.0.1:48822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:32.299690 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:18:32.300507 systemd-logind[1210]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:18:32.301180 systemd-logind[1210]: Removed session 12. Dec 13 14:18:32.962806 env[1222]: time="2024-12-13T14:18:32.962702031Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:32.966654 env[1222]: time="2024-12-13T14:18:32.966620271Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:32.970276 env[1222]: time="2024-12-13T14:18:32.970238192Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:32.973637 env[1222]: time="2024-12-13T14:18:32.973604353Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:32.974215 env[1222]: time="2024-12-13T14:18:32.974188073Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163\"" Dec 13 14:18:32.975778 env[1222]: time="2024-12-13T14:18:32.975744593Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:18:32.976963 env[1222]: time="2024-12-13T14:18:32.976919434Z" level=info msg="CreateContainer within sandbox \"4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:18:32.990758 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2879989932.mount: Deactivated successfully. Dec 13 14:18:32.991688 env[1222]: time="2024-12-13T14:18:32.991472277Z" level=info msg="CreateContainer within sandbox \"4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"3b128b8df351ca05096debe2f57062a365bd5108ac475a894a7d316604e63b8b\"" Dec 13 14:18:32.992563 env[1222]: time="2024-12-13T14:18:32.992526797Z" level=info msg="StartContainer for \"3b128b8df351ca05096debe2f57062a365bd5108ac475a894a7d316604e63b8b\"" Dec 13 14:18:33.021711 systemd[1]: Started cri-containerd-3b128b8df351ca05096debe2f57062a365bd5108ac475a894a7d316604e63b8b.scope. Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4087 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:33.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313238623864663335316361303530393664656265326635373036 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit: BPF prog-id=198 op=LOAD Dec 13 14:18:33.060000 audit[4335]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4087 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:33.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313238623864663335316361303530393664656265326635373036 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit: BPF prog-id=199 op=LOAD Dec 13 14:18:33.060000 audit[4335]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4087 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:33.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313238623864663335316361303530393664656265326635373036 Dec 13 14:18:33.060000 audit: BPF prog-id=199 op=UNLOAD Dec 13 14:18:33.060000 audit: BPF prog-id=198 op=UNLOAD Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { perfmon } for pid=4335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit[4335]: AVC avc: denied { bpf } for pid=4335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.060000 audit: BPF prog-id=200 op=LOAD Dec 13 14:18:33.060000 audit[4335]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4087 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:33.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362313238623864663335316361303530393664656265326635373036 Dec 13 14:18:33.110911 env[1222]: time="2024-12-13T14:18:33.110857421Z" level=info msg="StartContainer for \"3b128b8df351ca05096debe2f57062a365bd5108ac475a894a7d316604e63b8b\" returns successfully" Dec 13 14:18:33.231167 kubelet[1957]: I1213 14:18:33.231044 1957 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:18:33.231752 env[1222]: time="2024-12-13T14:18:33.231696125Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:33.233831 env[1222]: time="2024-12-13T14:18:33.233796846Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:33.238377 env[1222]: time="2024-12-13T14:18:33.238345047Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:33.245315 env[1222]: time="2024-12-13T14:18:33.244524168Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:33.245315 env[1222]: time="2024-12-13T14:18:33.244741768Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c\"" Dec 13 14:18:33.246730 env[1222]: time="2024-12-13T14:18:33.246332528Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:18:33.247890 env[1222]: time="2024-12-13T14:18:33.247854648Z" level=info msg="CreateContainer within sandbox \"158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:18:33.261133 env[1222]: time="2024-12-13T14:18:33.261073891Z" level=info msg="CreateContainer within sandbox \"158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"4f198100f398a1fcd297a8f2f70bbc5f6bacf0f8b24088028a70d01166fea711\"" Dec 13 14:18:33.261772 env[1222]: time="2024-12-13T14:18:33.261739611Z" level=info msg="StartContainer for \"4f198100f398a1fcd297a8f2f70bbc5f6bacf0f8b24088028a70d01166fea711\"" Dec 13 14:18:33.276018 systemd[1]: Started cri-containerd-4f198100f398a1fcd297a8f2f70bbc5f6bacf0f8b24088028a70d01166fea711.scope. Dec 13 14:18:33.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.296000 audit: BPF prog-id=201 op=LOAD Dec 13 14:18:33.296000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.296000 audit[4368]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4143 pid=4368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:33.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466313938313030663339386131666364323937613866326637306262 Dec 13 14:18:33.296000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.296000 audit[4368]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4143 pid=4368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:33.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466313938313030663339386131666364323937613866326637306262 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit: BPF prog-id=202 op=LOAD Dec 13 14:18:33.297000 audit[4368]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4143 pid=4368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:33.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466313938313030663339386131666364323937613866326637306262 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit: BPF prog-id=203 op=LOAD Dec 13 14:18:33.297000 audit[4368]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4143 pid=4368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:33.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466313938313030663339386131666364323937613866326637306262 Dec 13 14:18:33.297000 audit: BPF prog-id=203 op=UNLOAD Dec 13 14:18:33.297000 audit: BPF prog-id=202 op=UNLOAD Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { perfmon } for pid=4368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit[4368]: AVC avc: denied { bpf } for pid=4368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:33.297000 audit: BPF prog-id=204 op=LOAD Dec 13 14:18:33.297000 audit[4368]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4143 pid=4368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:33.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466313938313030663339386131666364323937613866326637306262 Dec 13 14:18:33.324750 env[1222]: time="2024-12-13T14:18:33.324699064Z" level=info msg="StartContainer for \"4f198100f398a1fcd297a8f2f70bbc5f6bacf0f8b24088028a70d01166fea711\" returns successfully" Dec 13 14:18:34.253000 audit[4399]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4399 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:34.253000 audit[4399]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=fffffe06e9f0 a2=0 a3=1 items=0 ppid=2108 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:34.253000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:34.258000 audit[4399]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4399 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:34.258000 audit[4399]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffe06e9f0 a2=0 a3=1 items=0 ppid=2108 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:34.258000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:34.387405 env[1222]: time="2024-12-13T14:18:34.387363792Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:34.403557 env[1222]: time="2024-12-13T14:18:34.403510195Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:34.405589 env[1222]: time="2024-12-13T14:18:34.404736196Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:34.407500 env[1222]: time="2024-12-13T14:18:34.406930796Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:34.407741 env[1222]: time="2024-12-13T14:18:34.407707436Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349\"" Dec 13 14:18:34.411058 env[1222]: time="2024-12-13T14:18:34.411019797Z" level=info msg="CreateContainer within sandbox \"4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:18:34.466406 env[1222]: time="2024-12-13T14:18:34.466327287Z" level=info msg="CreateContainer within sandbox \"4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"b4eb70a789b5ab3ba3033cb962c199fdf479e071651786f001cc8603bf025579\"" Dec 13 14:18:34.467265 env[1222]: time="2024-12-13T14:18:34.467233287Z" level=info msg="StartContainer for \"b4eb70a789b5ab3ba3033cb962c199fdf479e071651786f001cc8603bf025579\"" Dec 13 14:18:34.492956 systemd[1]: Started cri-containerd-b4eb70a789b5ab3ba3033cb962c199fdf479e071651786f001cc8603bf025579.scope. Dec 13 14:18:34.532000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.532000 audit[4407]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4087 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:34.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234656237306137383962356162336261333033336362393632633139 Dec 13 14:18:34.532000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.532000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.532000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.532000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.532000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.532000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.532000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.532000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.532000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.532000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.532000 audit: BPF prog-id=205 op=LOAD Dec 13 14:18:34.532000 audit[4407]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4087 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:34.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234656237306137383962356162336261333033336362393632633139 Dec 13 14:18:34.533000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.533000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.533000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.533000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.533000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.533000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.533000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.533000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.533000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.533000 audit: BPF prog-id=206 op=LOAD Dec 13 14:18:34.533000 audit[4407]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4087 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:34.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234656237306137383962356162336261333033336362393632633139 Dec 13 14:18:34.534000 audit: BPF prog-id=206 op=UNLOAD Dec 13 14:18:34.534000 audit: BPF prog-id=205 op=UNLOAD Dec 13 14:18:34.534000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.534000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.534000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.534000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.534000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.534000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.534000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.534000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.534000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.534000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:34.534000 audit: BPF prog-id=207 op=LOAD Dec 13 14:18:34.534000 audit[4407]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4087 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:34.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234656237306137383962356162336261333033336362393632633139 Dec 13 14:18:34.551404 env[1222]: time="2024-12-13T14:18:34.551304423Z" level=info msg="StartContainer for \"b4eb70a789b5ab3ba3033cb962c199fdf479e071651786f001cc8603bf025579\" returns successfully" Dec 13 14:18:34.862000 audit[4281]: AVC avc: denied { watch } for pid=4281 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_18_13.992806653/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c337,c531 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c337,c531 tclass=file permissive=0 Dec 13 14:18:34.862000 audit[4281]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40009925c0 a2=fc6 a3=0 items=0 ppid=3676 pid=4281 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c337,c531 key=(null) Dec 13 14:18:34.862000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:18:35.176410 kubelet[1957]: I1213 14:18:35.176314 1957 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:18:35.176839 kubelet[1957]: I1213 14:18:35.176822 1957 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:18:35.237196 kubelet[1957]: I1213 14:18:35.237164 1957 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:18:35.259852 kubelet[1957]: I1213 14:18:35.259790 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-5llpq" podStartSLOduration=26.342600497 podStartE2EDuration="31.259773874s" podCreationTimestamp="2024-12-13 14:18:04 +0000 UTC" firstStartedPulling="2024-12-13 14:18:29.4920219 +0000 UTC m=+37.470483664" lastFinishedPulling="2024-12-13 14:18:34.409195277 +0000 UTC m=+42.387657041" observedRunningTime="2024-12-13 14:18:35.256241553 +0000 UTC m=+43.234703317" watchObservedRunningTime="2024-12-13 14:18:35.259773874 +0000 UTC m=+43.238235598" Dec 13 14:18:35.260411 kubelet[1957]: I1213 14:18:35.260304 1957 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6c989998dd-99gmc" podStartSLOduration=27.609292633 podStartE2EDuration="31.260294714s" podCreationTimestamp="2024-12-13 14:18:04 +0000 UTC" firstStartedPulling="2024-12-13 14:18:29.595061287 +0000 UTC m=+37.573523051" lastFinishedPulling="2024-12-13 14:18:33.246063368 +0000 UTC m=+41.224525132" observedRunningTime="2024-12-13 14:18:34.244414566 +0000 UTC m=+42.222876330" watchObservedRunningTime="2024-12-13 14:18:35.260294714 +0000 UTC m=+43.238756478" Dec 13 14:18:35.420000 audit[4378]: AVC avc: denied { watch } for pid=4378 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_18_13.1376715103/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c60,c421 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c60,c421 tclass=file permissive=0 Dec 13 14:18:35.420000 audit[4378]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000b8d020 a2=fc6 a3=0 items=0 ppid=4143 pid=4378 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c60,c421 key=(null) Dec 13 14:18:35.420000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:18:37.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.118:22-10.0.0.1:59730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:37.300681 kernel: kauditd_printk_skb: 241 callbacks suppressed Dec 13 14:18:37.300736 kernel: audit: type=1130 audit(1734099517.298:1392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.118:22-10.0.0.1:59730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:37.299775 systemd[1]: Started sshd@12-10.0.0.118:22-10.0.0.1:59730.service. Dec 13 14:18:37.341000 audit[4446]: USER_ACCT pid=4446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:37.342493 sshd[4446]: Accepted publickey for core from 10.0.0.1 port 59730 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:18:37.342000 audit[4446]: CRED_ACQ pid=4446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:37.345067 sshd[4446]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:37.347180 kernel: audit: type=1101 audit(1734099517.341:1393): pid=4446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:37.347246 kernel: audit: type=1103 audit(1734099517.342:1394): pid=4446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:37.347268 kernel: audit: type=1006 audit(1734099517.342:1395): pid=4446 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Dec 13 14:18:37.348509 kernel: audit: type=1300 audit(1734099517.342:1395): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8449f30 a2=3 a3=1 items=0 ppid=1 pid=4446 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:37.342000 audit[4446]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8449f30 a2=3 a3=1 items=0 ppid=1 pid=4446 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:37.351173 kernel: audit: type=1327 audit(1734099517.342:1395): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:37.342000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:37.350913 systemd-logind[1210]: New session 13 of user core. Dec 13 14:18:37.351374 systemd[1]: Started session-13.scope. Dec 13 14:18:37.354000 audit[4446]: USER_START pid=4446 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:37.355000 audit[4448]: CRED_ACQ pid=4448 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:37.359954 kernel: audit: type=1105 audit(1734099517.354:1396): pid=4446 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:37.359995 kernel: audit: type=1103 audit(1734099517.355:1397): pid=4448 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:37.507562 sshd[4446]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:37.507000 audit[4446]: USER_END pid=4446 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:37.510502 systemd[1]: sshd@12-10.0.0.118:22-10.0.0.1:59730.service: Deactivated successfully. Dec 13 14:18:37.511252 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:18:37.507000 audit[4446]: CRED_DISP pid=4446 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:37.513463 kernel: audit: type=1106 audit(1734099517.507:1398): pid=4446 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:37.513518 kernel: audit: type=1104 audit(1734099517.507:1399): pid=4446 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:37.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.118:22-10.0.0.1:59730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:37.513839 systemd-logind[1210]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:18:37.514480 systemd-logind[1210]: Removed session 13. Dec 13 14:18:42.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.118:22-10.0.0.1:45444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:42.512143 systemd[1]: Started sshd@13-10.0.0.118:22-10.0.0.1:45444.service. Dec 13 14:18:42.514966 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:18:42.515084 kernel: audit: type=1130 audit(1734099522.511:1401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.118:22-10.0.0.1:45444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:42.548000 audit[4467]: USER_ACCT pid=4467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:42.550161 sshd[4467]: Accepted publickey for core from 10.0.0.1 port 45444 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:18:42.551750 sshd[4467]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:42.550000 audit[4467]: CRED_ACQ pid=4467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:42.554644 kernel: audit: type=1101 audit(1734099522.548:1402): pid=4467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:42.554711 kernel: audit: type=1103 audit(1734099522.550:1403): pid=4467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:42.554740 kernel: audit: type=1006 audit(1734099522.550:1404): pid=4467 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 14:18:42.555973 systemd-logind[1210]: New session 14 of user core. Dec 13 14:18:42.556226 kernel: audit: type=1300 audit(1734099522.550:1404): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe57db470 a2=3 a3=1 items=0 ppid=1 pid=4467 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:42.550000 audit[4467]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe57db470 a2=3 a3=1 items=0 ppid=1 pid=4467 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:42.556250 systemd[1]: Started session-14.scope. Dec 13 14:18:42.550000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:42.559395 kernel: audit: type=1327 audit(1734099522.550:1404): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:42.558000 audit[4467]: USER_START pid=4467 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:42.562771 kernel: audit: type=1105 audit(1734099522.558:1405): pid=4467 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:42.562837 kernel: audit: type=1103 audit(1734099522.559:1406): pid=4469 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:42.559000 audit[4469]: CRED_ACQ pid=4469 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:42.679449 sshd[4467]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:42.679000 audit[4467]: USER_END pid=4467 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:42.682426 systemd[1]: sshd@13-10.0.0.118:22-10.0.0.1:45444.service: Deactivated successfully. Dec 13 14:18:42.683183 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:18:42.679000 audit[4467]: CRED_DISP pid=4467 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:42.683687 systemd-logind[1210]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:18:42.684320 systemd-logind[1210]: Removed session 14. Dec 13 14:18:42.685301 kernel: audit: type=1106 audit(1734099522.679:1407): pid=4467 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:42.685357 kernel: audit: type=1104 audit(1734099522.679:1408): pid=4467 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:42.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.118:22-10.0.0.1:45444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:45.121707 systemd[1]: run-containerd-runc-k8s.io-ce677f7c05367341646203de60e681c13c304f3f47ca898bc28527c316c9dc49-runc.sx6uyr.mount: Deactivated successfully. Dec 13 14:18:47.683854 systemd[1]: Started sshd@14-10.0.0.118:22-10.0.0.1:45452.service. Dec 13 14:18:47.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.118:22-10.0.0.1:45452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:47.684584 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:18:47.684626 kernel: audit: type=1130 audit(1734099527.682:1410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.118:22-10.0.0.1:45452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:47.720000 audit[4500]: USER_ACCT pid=4500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:47.722157 sshd[4500]: Accepted publickey for core from 10.0.0.1 port 45452 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:18:47.723265 sshd[4500]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:47.721000 audit[4500]: CRED_ACQ pid=4500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:47.727006 kernel: audit: type=1101 audit(1734099527.720:1411): pid=4500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:47.727072 kernel: audit: type=1103 audit(1734099527.721:1412): pid=4500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:47.727096 kernel: audit: type=1006 audit(1734099527.721:1413): pid=4500 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:18:47.726611 systemd-logind[1210]: New session 15 of user core. Dec 13 14:18:47.727439 systemd[1]: Started session-15.scope. Dec 13 14:18:47.727974 kernel: audit: type=1300 audit(1734099527.721:1413): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffef313080 a2=3 a3=1 items=0 ppid=1 pid=4500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:47.721000 audit[4500]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffef313080 a2=3 a3=1 items=0 ppid=1 pid=4500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:47.730344 kernel: audit: type=1327 audit(1734099527.721:1413): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:47.721000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:47.729000 audit[4500]: USER_START pid=4500 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:47.733563 kernel: audit: type=1105 audit(1734099527.729:1414): pid=4500 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:47.733632 kernel: audit: type=1103 audit(1734099527.730:1415): pid=4502 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:47.730000 audit[4502]: CRED_ACQ pid=4502 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:47.842929 sshd[4500]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:47.842000 audit[4500]: USER_END pid=4500 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:47.842000 audit[4500]: CRED_DISP pid=4500 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:47.848978 kernel: audit: type=1106 audit(1734099527.842:1416): pid=4500 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:47.849030 kernel: audit: type=1104 audit(1734099527.842:1417): pid=4500 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:47.850666 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:18:47.851314 systemd-logind[1210]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:18:47.851414 systemd[1]: sshd@14-10.0.0.118:22-10.0.0.1:45452.service: Deactivated successfully. Dec 13 14:18:47.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.118:22-10.0.0.1:45452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:47.852562 systemd-logind[1210]: Removed session 15. Dec 13 14:18:48.789000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:48.789000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000f66c80 a2=fc6 a3=0 items=0 ppid=1677 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 key=(null) Dec 13 14:18:48.789000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:48.789000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:48.789000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400061eea0 a2=fc6 a3=0 items=0 ppid=1677 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 key=(null) Dec 13 14:18:48.789000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:48.807099 kubelet[1957]: E1213 14:18:48.807067 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:49.473000 audit[1846]: AVC avc: denied { watch } for pid=1846 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:49.473000 audit[1846]: AVC avc: denied { watch } for pid=1846 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7289 scontext=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:49.473000 audit[1846]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4008aa45c0 a2=fc6 a3=0 items=0 ppid=1675 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 key=(null) Dec 13 14:18:49.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:18:49.473000 audit[1846]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=400827eba0 a2=fc6 a3=0 items=0 ppid=1675 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 key=(null) Dec 13 14:18:49.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:18:49.482000 audit[1846]: AVC avc: denied { watch } for pid=1846 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:49.482000 audit[1846]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4007dc0c60 a2=fc6 a3=0 items=0 ppid=1675 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 key=(null) Dec 13 14:18:49.482000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:18:49.482000 audit[1846]: AVC avc: denied { watch } for pid=1846 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7295 scontext=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:49.482000 audit[1846]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=40085a6000 a2=fc6 a3=0 items=0 ppid=1675 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 key=(null) Dec 13 14:18:49.482000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:18:49.482000 audit[1846]: AVC avc: denied { watch } for pid=1846 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:49.482000 audit[1846]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=4008832a00 a2=fc6 a3=0 items=0 ppid=1675 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 key=(null) Dec 13 14:18:49.482000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:18:49.483000 audit[1846]: AVC avc: denied { watch } for pid=1846 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:49.483000 audit[1846]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4008427170 a2=fc6 a3=0 items=0 ppid=1675 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c177,c971 key=(null) Dec 13 14:18:49.483000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 14:18:52.099407 env[1222]: time="2024-12-13T14:18:52.099368955Z" level=info msg="StopPodSandbox for \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\"" Dec 13 14:18:52.186685 env[1222]: 2024-12-13 14:18:52.147 [WARNING][4555] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0", GenerateName:"calico-apiserver-6c989998dd-", Namespace:"calico-apiserver", SelfLink:"", UID:"9d06110c-3d65-4ba2-a219-42723ec9b262", ResourceVersion:"948", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c989998dd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2", Pod:"calico-apiserver-6c989998dd-99gmc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali76dc8863fc1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:52.186685 env[1222]: 2024-12-13 14:18:52.148 [INFO][4555] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Dec 13 14:18:52.186685 env[1222]: 2024-12-13 14:18:52.148 [INFO][4555] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" iface="eth0" netns="" Dec 13 14:18:52.186685 env[1222]: 2024-12-13 14:18:52.148 [INFO][4555] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Dec 13 14:18:52.186685 env[1222]: 2024-12-13 14:18:52.148 [INFO][4555] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Dec 13 14:18:52.186685 env[1222]: 2024-12-13 14:18:52.173 [INFO][4563] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" HandleID="k8s-pod-network.e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Workload="localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0" Dec 13 14:18:52.186685 env[1222]: 2024-12-13 14:18:52.174 [INFO][4563] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:52.186685 env[1222]: 2024-12-13 14:18:52.174 [INFO][4563] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:52.186685 env[1222]: 2024-12-13 14:18:52.181 [WARNING][4563] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" HandleID="k8s-pod-network.e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Workload="localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0" Dec 13 14:18:52.186685 env[1222]: 2024-12-13 14:18:52.181 [INFO][4563] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" HandleID="k8s-pod-network.e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Workload="localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0" Dec 13 14:18:52.186685 env[1222]: 2024-12-13 14:18:52.183 [INFO][4563] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:52.186685 env[1222]: 2024-12-13 14:18:52.184 [INFO][4555] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Dec 13 14:18:52.187081 env[1222]: time="2024-12-13T14:18:52.186706040Z" level=info msg="TearDown network for sandbox \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\" successfully" Dec 13 14:18:52.187081 env[1222]: time="2024-12-13T14:18:52.186733480Z" level=info msg="StopPodSandbox for \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\" returns successfully" Dec 13 14:18:52.187335 env[1222]: time="2024-12-13T14:18:52.187295200Z" level=info msg="RemovePodSandbox for \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\"" Dec 13 14:18:52.187380 env[1222]: time="2024-12-13T14:18:52.187329640Z" level=info msg="Forcibly stopping sandbox \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\"" Dec 13 14:18:52.278340 env[1222]: 2024-12-13 14:18:52.230 [WARNING][4587] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0", GenerateName:"calico-apiserver-6c989998dd-", Namespace:"calico-apiserver", SelfLink:"", UID:"9d06110c-3d65-4ba2-a219-42723ec9b262", ResourceVersion:"948", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c989998dd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"158ddfa4957e6a3f75fdde798b9cd05efa9b04479b5ec46d91385cf27b4954d2", Pod:"calico-apiserver-6c989998dd-99gmc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali76dc8863fc1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:52.278340 env[1222]: 2024-12-13 14:18:52.231 [INFO][4587] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Dec 13 14:18:52.278340 env[1222]: 2024-12-13 14:18:52.231 [INFO][4587] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" iface="eth0" netns="" Dec 13 14:18:52.278340 env[1222]: 2024-12-13 14:18:52.231 [INFO][4587] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Dec 13 14:18:52.278340 env[1222]: 2024-12-13 14:18:52.231 [INFO][4587] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Dec 13 14:18:52.278340 env[1222]: 2024-12-13 14:18:52.251 [INFO][4604] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" HandleID="k8s-pod-network.e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Workload="localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0" Dec 13 14:18:52.278340 env[1222]: 2024-12-13 14:18:52.252 [INFO][4604] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:52.278340 env[1222]: 2024-12-13 14:18:52.252 [INFO][4604] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:52.278340 env[1222]: 2024-12-13 14:18:52.265 [WARNING][4604] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" HandleID="k8s-pod-network.e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Workload="localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0" Dec 13 14:18:52.278340 env[1222]: 2024-12-13 14:18:52.265 [INFO][4604] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" HandleID="k8s-pod-network.e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Workload="localhost-k8s-calico--apiserver--6c989998dd--99gmc-eth0" Dec 13 14:18:52.278340 env[1222]: 2024-12-13 14:18:52.267 [INFO][4604] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:52.278340 env[1222]: 2024-12-13 14:18:52.272 [INFO][4587] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f" Dec 13 14:18:52.278340 env[1222]: time="2024-12-13T14:18:52.275960645Z" level=info msg="TearDown network for sandbox \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\" successfully" Dec 13 14:18:52.281010 env[1222]: time="2024-12-13T14:18:52.280673286Z" level=info msg="RemovePodSandbox \"e6eb2da88327cadc6db0d8437d3ea5bfacb28bf98855a83daf79dc376b49527f\" returns successfully" Dec 13 14:18:52.288413 env[1222]: time="2024-12-13T14:18:52.288370886Z" level=info msg="StopPodSandbox for \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\"" Dec 13 14:18:52.357481 env[1222]: 2024-12-13 14:18:52.325 [WARNING][4640] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"679e6bd2-1bda-4ac3-9dc1-b4d0e81bd8b9", ResourceVersion:"871", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 17, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e", Pod:"coredns-6f6b679f8f-rxqcv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2836b564324", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:52.357481 env[1222]: 2024-12-13 14:18:52.326 [INFO][4640] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Dec 13 14:18:52.357481 env[1222]: 2024-12-13 14:18:52.326 [INFO][4640] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" iface="eth0" netns="" Dec 13 14:18:52.357481 env[1222]: 2024-12-13 14:18:52.326 [INFO][4640] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Dec 13 14:18:52.357481 env[1222]: 2024-12-13 14:18:52.326 [INFO][4640] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Dec 13 14:18:52.357481 env[1222]: 2024-12-13 14:18:52.344 [INFO][4647] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" HandleID="k8s-pod-network.cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Workload="localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0" Dec 13 14:18:52.357481 env[1222]: 2024-12-13 14:18:52.345 [INFO][4647] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:52.357481 env[1222]: 2024-12-13 14:18:52.345 [INFO][4647] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:52.357481 env[1222]: 2024-12-13 14:18:52.352 [WARNING][4647] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" HandleID="k8s-pod-network.cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Workload="localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0" Dec 13 14:18:52.357481 env[1222]: 2024-12-13 14:18:52.352 [INFO][4647] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" HandleID="k8s-pod-network.cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Workload="localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0" Dec 13 14:18:52.357481 env[1222]: 2024-12-13 14:18:52.353 [INFO][4647] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:52.357481 env[1222]: 2024-12-13 14:18:52.355 [INFO][4640] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Dec 13 14:18:52.357481 env[1222]: time="2024-12-13T14:18:52.357453810Z" level=info msg="TearDown network for sandbox \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\" successfully" Dec 13 14:18:52.357481 env[1222]: time="2024-12-13T14:18:52.357483730Z" level=info msg="StopPodSandbox for \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\" returns successfully" Dec 13 14:18:52.358058 env[1222]: time="2024-12-13T14:18:52.358012610Z" level=info msg="RemovePodSandbox for \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\"" Dec 13 14:18:52.358098 env[1222]: time="2024-12-13T14:18:52.358065090Z" level=info msg="Forcibly stopping sandbox \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\"" Dec 13 14:18:52.437862 env[1222]: 2024-12-13 14:18:52.399 [WARNING][4669] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"679e6bd2-1bda-4ac3-9dc1-b4d0e81bd8b9", ResourceVersion:"871", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 17, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"549b2239c1f0f2bd227b527b5724f607c9810e5b36fc888e47c656b90cc2864e", Pod:"coredns-6f6b679f8f-rxqcv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2836b564324", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:52.437862 env[1222]: 2024-12-13 14:18:52.399 [INFO][4669] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Dec 13 14:18:52.437862 env[1222]: 2024-12-13 14:18:52.399 [INFO][4669] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" iface="eth0" netns="" Dec 13 14:18:52.437862 env[1222]: 2024-12-13 14:18:52.399 [INFO][4669] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Dec 13 14:18:52.437862 env[1222]: 2024-12-13 14:18:52.399 [INFO][4669] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Dec 13 14:18:52.437862 env[1222]: 2024-12-13 14:18:52.416 [INFO][4677] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" HandleID="k8s-pod-network.cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Workload="localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0" Dec 13 14:18:52.437862 env[1222]: 2024-12-13 14:18:52.417 [INFO][4677] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:52.437862 env[1222]: 2024-12-13 14:18:52.417 [INFO][4677] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:52.437862 env[1222]: 2024-12-13 14:18:52.426 [WARNING][4677] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" HandleID="k8s-pod-network.cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Workload="localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0" Dec 13 14:18:52.437862 env[1222]: 2024-12-13 14:18:52.426 [INFO][4677] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" HandleID="k8s-pod-network.cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Workload="localhost-k8s-coredns--6f6b679f8f--rxqcv-eth0" Dec 13 14:18:52.437862 env[1222]: 2024-12-13 14:18:52.428 [INFO][4677] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:52.437862 env[1222]: 2024-12-13 14:18:52.434 [INFO][4669] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28" Dec 13 14:18:52.438333 env[1222]: time="2024-12-13T14:18:52.437868975Z" level=info msg="TearDown network for sandbox \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\" successfully" Dec 13 14:18:52.441293 env[1222]: time="2024-12-13T14:18:52.441251455Z" level=info msg="RemovePodSandbox \"cf2ff18308a7269135fcef34f641930787ab2af882f3e90c448868813cfa6f28\" returns successfully" Dec 13 14:18:52.441736 env[1222]: time="2024-12-13T14:18:52.441709855Z" level=info msg="StopPodSandbox for \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\"" Dec 13 14:18:52.518366 env[1222]: 2024-12-13 14:18:52.477 [WARNING][4700] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0", GenerateName:"calico-kube-controllers-7f9f6b67d6-", Namespace:"calico-system", SelfLink:"", UID:"757821e6-5631-4cb2-8280-cc916fab5158", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7f9f6b67d6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37", Pod:"calico-kube-controllers-7f9f6b67d6-5bs66", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3e36ebc54d6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:52.518366 env[1222]: 2024-12-13 14:18:52.477 [INFO][4700] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Dec 13 14:18:52.518366 env[1222]: 2024-12-13 14:18:52.477 [INFO][4700] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" iface="eth0" netns="" Dec 13 14:18:52.518366 env[1222]: 2024-12-13 14:18:52.477 [INFO][4700] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Dec 13 14:18:52.518366 env[1222]: 2024-12-13 14:18:52.478 [INFO][4700] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Dec 13 14:18:52.518366 env[1222]: 2024-12-13 14:18:52.496 [INFO][4708] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" HandleID="k8s-pod-network.8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Workload="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0" Dec 13 14:18:52.518366 env[1222]: 2024-12-13 14:18:52.496 [INFO][4708] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:52.518366 env[1222]: 2024-12-13 14:18:52.496 [INFO][4708] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:52.518366 env[1222]: 2024-12-13 14:18:52.505 [WARNING][4708] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" HandleID="k8s-pod-network.8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Workload="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0" Dec 13 14:18:52.518366 env[1222]: 2024-12-13 14:18:52.505 [INFO][4708] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" HandleID="k8s-pod-network.8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Workload="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0" Dec 13 14:18:52.518366 env[1222]: 2024-12-13 14:18:52.514 [INFO][4708] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:52.518366 env[1222]: 2024-12-13 14:18:52.516 [INFO][4700] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Dec 13 14:18:52.518795 env[1222]: time="2024-12-13T14:18:52.518397620Z" level=info msg="TearDown network for sandbox \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\" successfully" Dec 13 14:18:52.518795 env[1222]: time="2024-12-13T14:18:52.518436020Z" level=info msg="StopPodSandbox for \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\" returns successfully" Dec 13 14:18:52.518944 env[1222]: time="2024-12-13T14:18:52.518911580Z" level=info msg="RemovePodSandbox for \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\"" Dec 13 14:18:52.518982 env[1222]: time="2024-12-13T14:18:52.518953500Z" level=info msg="Forcibly stopping sandbox \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\"" Dec 13 14:18:52.583856 env[1222]: 2024-12-13 14:18:52.551 [WARNING][4731] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0", GenerateName:"calico-kube-controllers-7f9f6b67d6-", Namespace:"calico-system", SelfLink:"", UID:"757821e6-5631-4cb2-8280-cc916fab5158", ResourceVersion:"900", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7f9f6b67d6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8c32328a8047742af97663fbb75ab7e29a49d9a28ed17ac59ec131aacd4aab37", Pod:"calico-kube-controllers-7f9f6b67d6-5bs66", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali3e36ebc54d6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:52.583856 env[1222]: 2024-12-13 14:18:52.551 [INFO][4731] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Dec 13 14:18:52.583856 env[1222]: 2024-12-13 14:18:52.551 [INFO][4731] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" iface="eth0" netns="" Dec 13 14:18:52.583856 env[1222]: 2024-12-13 14:18:52.552 [INFO][4731] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Dec 13 14:18:52.583856 env[1222]: 2024-12-13 14:18:52.552 [INFO][4731] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Dec 13 14:18:52.583856 env[1222]: 2024-12-13 14:18:52.571 [INFO][4739] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" HandleID="k8s-pod-network.8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Workload="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0" Dec 13 14:18:52.583856 env[1222]: 2024-12-13 14:18:52.571 [INFO][4739] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:52.583856 env[1222]: 2024-12-13 14:18:52.571 [INFO][4739] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:52.583856 env[1222]: 2024-12-13 14:18:52.578 [WARNING][4739] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" HandleID="k8s-pod-network.8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Workload="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0" Dec 13 14:18:52.583856 env[1222]: 2024-12-13 14:18:52.578 [INFO][4739] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" HandleID="k8s-pod-network.8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Workload="localhost-k8s-calico--kube--controllers--7f9f6b67d6--5bs66-eth0" Dec 13 14:18:52.583856 env[1222]: 2024-12-13 14:18:52.580 [INFO][4739] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:52.583856 env[1222]: 2024-12-13 14:18:52.582 [INFO][4731] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526" Dec 13 14:18:52.584262 env[1222]: time="2024-12-13T14:18:52.583877904Z" level=info msg="TearDown network for sandbox \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\" successfully" Dec 13 14:18:52.586724 env[1222]: time="2024-12-13T14:18:52.586694304Z" level=info msg="RemovePodSandbox \"8fb33594fa1758512501d45ef050ad88c9d6dc78f32eea3493dbcd0d565be526\" returns successfully" Dec 13 14:18:52.587161 env[1222]: time="2024-12-13T14:18:52.587114264Z" level=info msg="StopPodSandbox for \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\"" Dec 13 14:18:52.654035 env[1222]: 2024-12-13 14:18:52.620 [WARNING][4763] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--k7v25-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"37cabeba-c967-4ce9-8cc6-a2c93781d3be", ResourceVersion:"846", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 17, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292", Pod:"coredns-6f6b679f8f-k7v25", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1133299c6e8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:52.654035 env[1222]: 2024-12-13 14:18:52.620 [INFO][4763] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Dec 13 14:18:52.654035 env[1222]: 2024-12-13 14:18:52.620 [INFO][4763] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" iface="eth0" netns="" Dec 13 14:18:52.654035 env[1222]: 2024-12-13 14:18:52.620 [INFO][4763] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Dec 13 14:18:52.654035 env[1222]: 2024-12-13 14:18:52.620 [INFO][4763] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Dec 13 14:18:52.654035 env[1222]: 2024-12-13 14:18:52.641 [INFO][4770] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" HandleID="k8s-pod-network.1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Workload="localhost-k8s-coredns--6f6b679f8f--k7v25-eth0" Dec 13 14:18:52.654035 env[1222]: 2024-12-13 14:18:52.641 [INFO][4770] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:52.654035 env[1222]: 2024-12-13 14:18:52.641 [INFO][4770] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:52.654035 env[1222]: 2024-12-13 14:18:52.649 [WARNING][4770] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" HandleID="k8s-pod-network.1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Workload="localhost-k8s-coredns--6f6b679f8f--k7v25-eth0" Dec 13 14:18:52.654035 env[1222]: 2024-12-13 14:18:52.649 [INFO][4770] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" HandleID="k8s-pod-network.1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Workload="localhost-k8s-coredns--6f6b679f8f--k7v25-eth0" Dec 13 14:18:52.654035 env[1222]: 2024-12-13 14:18:52.650 [INFO][4770] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:52.654035 env[1222]: 2024-12-13 14:18:52.652 [INFO][4763] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Dec 13 14:18:52.655113 env[1222]: time="2024-12-13T14:18:52.654005908Z" level=info msg="TearDown network for sandbox \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\" successfully" Dec 13 14:18:52.655168 env[1222]: time="2024-12-13T14:18:52.655104228Z" level=info msg="StopPodSandbox for \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\" returns successfully" Dec 13 14:18:52.656168 env[1222]: time="2024-12-13T14:18:52.656122428Z" level=info msg="RemovePodSandbox for \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\"" Dec 13 14:18:52.656213 env[1222]: time="2024-12-13T14:18:52.656174988Z" level=info msg="Forcibly stopping sandbox \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\"" Dec 13 14:18:52.727122 env[1222]: 2024-12-13 14:18:52.694 [WARNING][4793] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--k7v25-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"37cabeba-c967-4ce9-8cc6-a2c93781d3be", ResourceVersion:"846", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 17, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e016cb14028848cf18a1a8478c87afc25f170398f69163eb910f727d0dcac292", Pod:"coredns-6f6b679f8f-k7v25", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1133299c6e8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:52.727122 env[1222]: 2024-12-13 14:18:52.694 [INFO][4793] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Dec 13 14:18:52.727122 env[1222]: 2024-12-13 14:18:52.694 [INFO][4793] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" iface="eth0" netns="" Dec 13 14:18:52.727122 env[1222]: 2024-12-13 14:18:52.694 [INFO][4793] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Dec 13 14:18:52.727122 env[1222]: 2024-12-13 14:18:52.694 [INFO][4793] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Dec 13 14:18:52.727122 env[1222]: 2024-12-13 14:18:52.713 [INFO][4801] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" HandleID="k8s-pod-network.1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Workload="localhost-k8s-coredns--6f6b679f8f--k7v25-eth0" Dec 13 14:18:52.727122 env[1222]: 2024-12-13 14:18:52.713 [INFO][4801] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:52.727122 env[1222]: 2024-12-13 14:18:52.713 [INFO][4801] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:52.727122 env[1222]: 2024-12-13 14:18:52.721 [WARNING][4801] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" HandleID="k8s-pod-network.1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Workload="localhost-k8s-coredns--6f6b679f8f--k7v25-eth0" Dec 13 14:18:52.727122 env[1222]: 2024-12-13 14:18:52.721 [INFO][4801] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" HandleID="k8s-pod-network.1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Workload="localhost-k8s-coredns--6f6b679f8f--k7v25-eth0" Dec 13 14:18:52.727122 env[1222]: 2024-12-13 14:18:52.723 [INFO][4801] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:52.727122 env[1222]: 2024-12-13 14:18:52.725 [INFO][4793] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7" Dec 13 14:18:52.727540 env[1222]: time="2024-12-13T14:18:52.727177552Z" level=info msg="TearDown network for sandbox \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\" successfully" Dec 13 14:18:52.730325 env[1222]: time="2024-12-13T14:18:52.730277912Z" level=info msg="RemovePodSandbox \"1bd3a19f53672f05d119aa1570aba7027c34b36ddb332232c8f01fd6bb50ccc7\" returns successfully" Dec 13 14:18:52.730757 env[1222]: time="2024-12-13T14:18:52.730718352Z" level=info msg="StopPodSandbox for \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\"" Dec 13 14:18:52.800350 env[1222]: 2024-12-13 14:18:52.763 [WARNING][4823] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0", GenerateName:"calico-apiserver-6c989998dd-", Namespace:"calico-apiserver", SelfLink:"", UID:"d6f83580-b3c3-4c3b-b3a0-70e6a6f0d8c1", ResourceVersion:"932", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c989998dd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f", Pod:"calico-apiserver-6c989998dd-kqlz6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali14e4a6e24e6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:52.800350 env[1222]: 2024-12-13 14:18:52.763 [INFO][4823] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Dec 13 14:18:52.800350 env[1222]: 2024-12-13 14:18:52.764 [INFO][4823] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" iface="eth0" netns="" Dec 13 14:18:52.800350 env[1222]: 2024-12-13 14:18:52.764 [INFO][4823] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Dec 13 14:18:52.800350 env[1222]: 2024-12-13 14:18:52.764 [INFO][4823] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Dec 13 14:18:52.800350 env[1222]: 2024-12-13 14:18:52.787 [INFO][4830] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" HandleID="k8s-pod-network.4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Workload="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0" Dec 13 14:18:52.800350 env[1222]: 2024-12-13 14:18:52.787 [INFO][4830] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:52.800350 env[1222]: 2024-12-13 14:18:52.787 [INFO][4830] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:52.800350 env[1222]: 2024-12-13 14:18:52.795 [WARNING][4830] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" HandleID="k8s-pod-network.4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Workload="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0" Dec 13 14:18:52.800350 env[1222]: 2024-12-13 14:18:52.795 [INFO][4830] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" HandleID="k8s-pod-network.4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Workload="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0" Dec 13 14:18:52.800350 env[1222]: 2024-12-13 14:18:52.796 [INFO][4830] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:52.800350 env[1222]: 2024-12-13 14:18:52.798 [INFO][4823] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Dec 13 14:18:52.800829 env[1222]: time="2024-12-13T14:18:52.800795756Z" level=info msg="TearDown network for sandbox \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\" successfully" Dec 13 14:18:52.800897 env[1222]: time="2024-12-13T14:18:52.800881396Z" level=info msg="StopPodSandbox for \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\" returns successfully" Dec 13 14:18:52.801514 env[1222]: time="2024-12-13T14:18:52.801478236Z" level=info msg="RemovePodSandbox for \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\"" Dec 13 14:18:52.801574 env[1222]: time="2024-12-13T14:18:52.801515116Z" level=info msg="Forcibly stopping sandbox \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\"" Dec 13 14:18:52.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.118:22-10.0.0.1:49626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:52.849862 systemd[1]: Started sshd@15-10.0.0.118:22-10.0.0.1:49626.service. Dec 13 14:18:52.852301 kernel: kauditd_printk_skb: 25 callbacks suppressed Dec 13 14:18:52.852330 kernel: audit: type=1130 audit(1734099532.848:1427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.118:22-10.0.0.1:49626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:52.904337 env[1222]: 2024-12-13 14:18:52.845 [WARNING][4853] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0", GenerateName:"calico-apiserver-6c989998dd-", Namespace:"calico-apiserver", SelfLink:"", UID:"d6f83580-b3c3-4c3b-b3a0-70e6a6f0d8c1", ResourceVersion:"932", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6c989998dd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c265ce6395d72ac1e9e3c81228943941b3e59e67f22dbfcb7ea6213653db465f", Pod:"calico-apiserver-6c989998dd-kqlz6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali14e4a6e24e6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:52.904337 env[1222]: 2024-12-13 14:18:52.845 [INFO][4853] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Dec 13 14:18:52.904337 env[1222]: 2024-12-13 14:18:52.845 [INFO][4853] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" iface="eth0" netns="" Dec 13 14:18:52.904337 env[1222]: 2024-12-13 14:18:52.845 [INFO][4853] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Dec 13 14:18:52.904337 env[1222]: 2024-12-13 14:18:52.845 [INFO][4853] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Dec 13 14:18:52.904337 env[1222]: 2024-12-13 14:18:52.869 [INFO][4862] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" HandleID="k8s-pod-network.4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Workload="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0" Dec 13 14:18:52.904337 env[1222]: 2024-12-13 14:18:52.870 [INFO][4862] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:52.904337 env[1222]: 2024-12-13 14:18:52.870 [INFO][4862] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:52.904337 env[1222]: 2024-12-13 14:18:52.885 [WARNING][4862] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" HandleID="k8s-pod-network.4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Workload="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0" Dec 13 14:18:52.904337 env[1222]: 2024-12-13 14:18:52.885 [INFO][4862] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" HandleID="k8s-pod-network.4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Workload="localhost-k8s-calico--apiserver--6c989998dd--kqlz6-eth0" Dec 13 14:18:52.904337 env[1222]: 2024-12-13 14:18:52.892 [INFO][4862] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:52.904337 env[1222]: 2024-12-13 14:18:52.898 [INFO][4853] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9" Dec 13 14:18:52.904337 env[1222]: time="2024-12-13T14:18:52.904302683Z" level=info msg="TearDown network for sandbox \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\" successfully" Dec 13 14:18:52.912441 env[1222]: time="2024-12-13T14:18:52.912383723Z" level=info msg="RemovePodSandbox \"4e2c09f88ba304b62bc8c50a4e866c4c01c591140a2cd5de63dffdb94c2073a9\" returns successfully" Dec 13 14:18:52.915596 env[1222]: time="2024-12-13T14:18:52.915558163Z" level=info msg="StopPodSandbox for \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\"" Dec 13 14:18:52.928361 sshd[4867]: Accepted publickey for core from 10.0.0.1 port 49626 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:18:52.927000 audit[4867]: USER_ACCT pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:52.931158 kernel: audit: type=1101 audit(1734099532.927:1428): pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:52.931787 sshd[4867]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:52.930000 audit[4867]: CRED_ACQ pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:52.935569 kernel: audit: type=1103 audit(1734099532.930:1429): pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:52.935642 kernel: audit: type=1006 audit(1734099532.930:1430): pid=4867 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:18:52.935666 kernel: audit: type=1300 audit(1734099532.930:1430): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe09f6ad0 a2=3 a3=1 items=0 ppid=1 pid=4867 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.930000 audit[4867]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe09f6ad0 a2=3 a3=1 items=0 ppid=1 pid=4867 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.930000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:52.939469 kernel: audit: type=1327 audit(1734099532.930:1430): proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:52.944228 systemd-logind[1210]: New session 16 of user core. Dec 13 14:18:52.944713 systemd[1]: Started session-16.scope. Dec 13 14:18:52.948000 audit[4867]: USER_START pid=4867 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:52.951000 audit[4891]: CRED_ACQ pid=4891 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:52.954883 kernel: audit: type=1105 audit(1734099532.948:1431): pid=4867 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:52.954945 kernel: audit: type=1103 audit(1734099532.951:1432): pid=4891 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:53.016676 env[1222]: 2024-12-13 14:18:52.980 [WARNING][4886] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--5llpq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"29bb0d43-5e2c-4f1d-91bc-dc52da9da965", ResourceVersion:"960", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd", Pod:"csi-node-driver-5llpq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2fa80e91929", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:53.016676 env[1222]: 2024-12-13 14:18:52.980 [INFO][4886] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Dec 13 14:18:53.016676 env[1222]: 2024-12-13 14:18:52.980 [INFO][4886] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" iface="eth0" netns="" Dec 13 14:18:53.016676 env[1222]: 2024-12-13 14:18:52.980 [INFO][4886] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Dec 13 14:18:53.016676 env[1222]: 2024-12-13 14:18:52.980 [INFO][4886] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Dec 13 14:18:53.016676 env[1222]: 2024-12-13 14:18:53.000 [INFO][4894] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" HandleID="k8s-pod-network.78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Workload="localhost-k8s-csi--node--driver--5llpq-eth0" Dec 13 14:18:53.016676 env[1222]: 2024-12-13 14:18:53.000 [INFO][4894] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:53.016676 env[1222]: 2024-12-13 14:18:53.000 [INFO][4894] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:53.016676 env[1222]: 2024-12-13 14:18:53.011 [WARNING][4894] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" HandleID="k8s-pod-network.78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Workload="localhost-k8s-csi--node--driver--5llpq-eth0" Dec 13 14:18:53.016676 env[1222]: 2024-12-13 14:18:53.011 [INFO][4894] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" HandleID="k8s-pod-network.78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Workload="localhost-k8s-csi--node--driver--5llpq-eth0" Dec 13 14:18:53.016676 env[1222]: 2024-12-13 14:18:53.012 [INFO][4894] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:53.016676 env[1222]: 2024-12-13 14:18:53.014 [INFO][4886] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Dec 13 14:18:53.017069 env[1222]: time="2024-12-13T14:18:53.016700769Z" level=info msg="TearDown network for sandbox \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\" successfully" Dec 13 14:18:53.017069 env[1222]: time="2024-12-13T14:18:53.016731049Z" level=info msg="StopPodSandbox for \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\" returns successfully" Dec 13 14:18:53.017328 env[1222]: time="2024-12-13T14:18:53.017298569Z" level=info msg="RemovePodSandbox for \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\"" Dec 13 14:18:53.017384 env[1222]: time="2024-12-13T14:18:53.017332049Z" level=info msg="Forcibly stopping sandbox \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\"" Dec 13 14:18:53.102424 sshd[4867]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:53.105724 systemd[1]: Started sshd@16-10.0.0.118:22-10.0.0.1:49630.service. Dec 13 14:18:53.103000 audit[4867]: USER_END pid=4867 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:53.104000 audit[4867]: CRED_DISP pid=4867 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:53.109421 systemd[1]: sshd@15-10.0.0.118:22-10.0.0.1:49626.service: Deactivated successfully. Dec 13 14:18:53.110362 systemd-logind[1210]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:18:53.111695 kernel: audit: type=1106 audit(1734099533.103:1433): pid=4867 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:53.111790 kernel: audit: type=1104 audit(1734099533.104:1434): pid=4867 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:53.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.118:22-10.0.0.1:49630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:53.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.118:22-10.0.0.1:49626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:53.113428 env[1222]: 2024-12-13 14:18:53.056 [WARNING][4926] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--5llpq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"29bb0d43-5e2c-4f1d-91bc-dc52da9da965", ResourceVersion:"960", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4ebac22a827abdc02a7dcf51df04c4cb298bbebc35b63ca1f267ec5c0b4f05fd", Pod:"csi-node-driver-5llpq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali2fa80e91929", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:18:53.113428 env[1222]: 2024-12-13 14:18:53.057 [INFO][4926] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Dec 13 14:18:53.113428 env[1222]: 2024-12-13 14:18:53.057 [INFO][4926] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" iface="eth0" netns="" Dec 13 14:18:53.113428 env[1222]: 2024-12-13 14:18:53.057 [INFO][4926] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Dec 13 14:18:53.113428 env[1222]: 2024-12-13 14:18:53.057 [INFO][4926] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Dec 13 14:18:53.113428 env[1222]: 2024-12-13 14:18:53.083 [INFO][4935] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" HandleID="k8s-pod-network.78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Workload="localhost-k8s-csi--node--driver--5llpq-eth0" Dec 13 14:18:53.113428 env[1222]: 2024-12-13 14:18:53.083 [INFO][4935] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:18:53.113428 env[1222]: 2024-12-13 14:18:53.083 [INFO][4935] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:18:53.113428 env[1222]: 2024-12-13 14:18:53.096 [WARNING][4935] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" HandleID="k8s-pod-network.78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Workload="localhost-k8s-csi--node--driver--5llpq-eth0" Dec 13 14:18:53.113428 env[1222]: 2024-12-13 14:18:53.096 [INFO][4935] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" HandleID="k8s-pod-network.78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Workload="localhost-k8s-csi--node--driver--5llpq-eth0" Dec 13 14:18:53.113428 env[1222]: 2024-12-13 14:18:53.098 [INFO][4935] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:18:53.113428 env[1222]: 2024-12-13 14:18:53.103 [INFO][4926] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141" Dec 13 14:18:53.113428 env[1222]: time="2024-12-13T14:18:53.111181814Z" level=info msg="TearDown network for sandbox \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\" successfully" Dec 13 14:18:53.111154 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:18:53.114806 systemd-logind[1210]: Removed session 16. Dec 13 14:18:53.118856 env[1222]: time="2024-12-13T14:18:53.118817735Z" level=info msg="RemovePodSandbox \"78f8895e904340da67f08b611ae29618f54154c597fc3f6e0077d2e0a9c6c141\" returns successfully" Dec 13 14:18:53.144000 audit[4943]: USER_ACCT pid=4943 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:53.145958 sshd[4943]: Accepted publickey for core from 10.0.0.1 port 49630 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:18:53.145000 audit[4943]: CRED_ACQ pid=4943 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:53.145000 audit[4943]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd0145e70 a2=3 a3=1 items=0 ppid=1 pid=4943 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:53.145000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:53.147361 sshd[4943]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:53.151262 systemd-logind[1210]: New session 17 of user core. Dec 13 14:18:53.151697 systemd[1]: Started session-17.scope. Dec 13 14:18:53.154000 audit[4943]: USER_START pid=4943 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:53.155000 audit[4946]: CRED_ACQ pid=4946 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:53.236000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:53.236000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40004a3ae0 a2=fc6 a3=0 items=0 ppid=1677 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 key=(null) Dec 13 14:18:53.236000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:53.238000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:53.238000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40011c9900 a2=fc6 a3=0 items=0 ppid=1677 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 key=(null) Dec 13 14:18:53.238000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:53.238000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:53.238000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40011503e0 a2=fc6 a3=0 items=0 ppid=1677 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 key=(null) Dec 13 14:18:53.238000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:53.238000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:18:53.238000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40011c9920 a2=fc6 a3=0 items=0 ppid=1677 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c81,c721 key=(null) Dec 13 14:18:53.238000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:18:53.376020 sshd[4943]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:53.376000 audit[4943]: USER_END pid=4943 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:53.377000 audit[4943]: CRED_DISP pid=4943 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:53.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.118:22-10.0.0.1:49644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:53.380004 systemd[1]: Started sshd@17-10.0.0.118:22-10.0.0.1:49644.service. Dec 13 14:18:53.384809 systemd[1]: sshd@16-10.0.0.118:22-10.0.0.1:49630.service: Deactivated successfully. Dec 13 14:18:53.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.118:22-10.0.0.1:49630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:53.385506 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:18:53.386101 systemd-logind[1210]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:18:53.387021 systemd-logind[1210]: Removed session 17. Dec 13 14:18:53.416000 audit[4955]: USER_ACCT pid=4955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:53.418162 sshd[4955]: Accepted publickey for core from 10.0.0.1 port 49644 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:18:53.417000 audit[4955]: CRED_ACQ pid=4955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:53.417000 audit[4955]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcf6fdf10 a2=3 a3=1 items=0 ppid=1 pid=4955 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:53.417000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:53.419596 sshd[4955]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:53.424643 systemd-logind[1210]: New session 18 of user core. Dec 13 14:18:53.425167 systemd[1]: Started session-18.scope. Dec 13 14:18:53.427000 audit[4955]: USER_START pid=4955 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:53.428000 audit[4958]: CRED_ACQ pid=4958 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:54.775000 audit[4973]: NETFILTER_CFG table=filter:119 family=2 entries=22 op=nft_register_rule pid=4973 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:54.775000 audit[4973]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12688 a0=3 a1=ffffeb4030d0 a2=0 a3=1 items=0 ppid=2108 pid=4973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:54.775000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:54.786442 sshd[4955]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:54.789894 systemd[1]: Started sshd@18-10.0.0.118:22-10.0.0.1:49648.service. Dec 13 14:18:54.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.118:22-10.0.0.1:49648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:54.785000 audit[4973]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4973 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:54.785000 audit[4973]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffeb4030d0 a2=0 a3=1 items=0 ppid=2108 pid=4973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:54.785000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:54.789000 audit[4955]: USER_END pid=4955 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:54.790000 audit[4955]: CRED_DISP pid=4955 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:54.793227 systemd[1]: sshd@17-10.0.0.118:22-10.0.0.1:49644.service: Deactivated successfully. Dec 13 14:18:54.793945 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:18:54.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.118:22-10.0.0.1:49644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:54.795159 systemd-logind[1210]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:18:54.796671 systemd-logind[1210]: Removed session 18. Dec 13 14:18:54.801000 audit[4978]: NETFILTER_CFG table=filter:121 family=2 entries=34 op=nft_register_rule pid=4978 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:54.801000 audit[4978]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12688 a0=3 a1=ffffe3c55940 a2=0 a3=1 items=0 ppid=2108 pid=4978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:54.801000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:54.806000 audit[4978]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4978 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:54.806000 audit[4978]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe3c55940 a2=0 a3=1 items=0 ppid=2108 pid=4978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:54.806000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:54.831000 audit[4975]: USER_ACCT pid=4975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:54.832632 sshd[4975]: Accepted publickey for core from 10.0.0.1 port 49648 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:18:54.832000 audit[4975]: CRED_ACQ pid=4975 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:54.832000 audit[4975]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd23c8c10 a2=3 a3=1 items=0 ppid=1 pid=4975 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:54.832000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:54.833884 sshd[4975]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:54.837948 systemd-logind[1210]: New session 19 of user core. Dec 13 14:18:54.838782 systemd[1]: Started session-19.scope. Dec 13 14:18:54.841000 audit[4975]: USER_START pid=4975 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:54.843000 audit[4980]: CRED_ACQ pid=4980 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:55.134523 sshd[4975]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:55.134000 audit[4975]: USER_END pid=4975 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:55.134000 audit[4975]: CRED_DISP pid=4975 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:55.137476 systemd[1]: sshd@18-10.0.0.118:22-10.0.0.1:49648.service: Deactivated successfully. Dec 13 14:18:55.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.118:22-10.0.0.1:49648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:55.138105 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:18:55.138993 systemd-logind[1210]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:18:55.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.118:22-10.0.0.1:49656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:55.140447 systemd[1]: Started sshd@19-10.0.0.118:22-10.0.0.1:49656.service. Dec 13 14:18:55.141188 systemd-logind[1210]: Removed session 19. Dec 13 14:18:55.176000 audit[4990]: USER_ACCT pid=4990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:55.177942 sshd[4990]: Accepted publickey for core from 10.0.0.1 port 49656 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:18:55.177000 audit[4990]: CRED_ACQ pid=4990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:55.177000 audit[4990]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff6af8a10 a2=3 a3=1 items=0 ppid=1 pid=4990 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:55.177000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:55.179194 sshd[4990]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:55.182878 systemd-logind[1210]: New session 20 of user core. Dec 13 14:18:55.183709 systemd[1]: Started session-20.scope. Dec 13 14:18:55.187000 audit[4990]: USER_START pid=4990 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:55.188000 audit[4992]: CRED_ACQ pid=4992 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:55.321644 sshd[4990]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:55.322000 audit[4990]: USER_END pid=4990 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:55.322000 audit[4990]: CRED_DISP pid=4990 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:55.325280 systemd[1]: sshd@19-10.0.0.118:22-10.0.0.1:49656.service: Deactivated successfully. Dec 13 14:18:55.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.118:22-10.0.0.1:49656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:55.326031 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:18:55.326614 systemd-logind[1210]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:18:55.327507 systemd-logind[1210]: Removed session 20. Dec 13 14:18:59.748000 audit[5007]: NETFILTER_CFG table=filter:123 family=2 entries=22 op=nft_register_rule pid=5007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:59.751625 kubelet[1957]: I1213 14:18:59.751594 1957 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:18:59.751978 kernel: kauditd_printk_skb: 69 callbacks suppressed Dec 13 14:18:59.752021 kernel: audit: type=1325 audit(1734099539.748:1480): table=filter:123 family=2 entries=22 op=nft_register_rule pid=5007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:59.752041 kernel: audit: type=1300 audit(1734099539.748:1480): arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffc0b11510 a2=0 a3=1 items=0 ppid=2108 pid=5007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:59.748000 audit[5007]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3760 a0=3 a1=ffffc0b11510 a2=0 a3=1 items=0 ppid=2108 pid=5007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:59.754616 kernel: audit: type=1327 audit(1734099539.748:1480): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:59.748000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:59.762000 audit[5007]: NETFILTER_CFG table=nat:124 family=2 entries=104 op=nft_register_chain pid=5007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:59.762000 audit[5007]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48684 a0=3 a1=ffffc0b11510 a2=0 a3=1 items=0 ppid=2108 pid=5007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:59.770483 kernel: audit: type=1325 audit(1734099539.762:1481): table=nat:124 family=2 entries=104 op=nft_register_chain pid=5007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:59.770535 kernel: audit: type=1300 audit(1734099539.762:1481): arch=c00000b7 syscall=211 success=yes exit=48684 a0=3 a1=ffffc0b11510 a2=0 a3=1 items=0 ppid=2108 pid=5007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:59.770569 kernel: audit: type=1327 audit(1734099539.762:1481): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:59.762000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:59.789000 audit[5010]: NETFILTER_CFG table=filter:125 family=2 entries=9 op=nft_register_rule pid=5010 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:59.789000 audit[5010]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffcd05e890 a2=0 a3=1 items=0 ppid=2108 pid=5010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:59.794751 kernel: audit: type=1325 audit(1734099539.789:1482): table=filter:125 family=2 entries=9 op=nft_register_rule pid=5010 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:59.794935 kernel: audit: type=1300 audit(1734099539.789:1482): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffcd05e890 a2=0 a3=1 items=0 ppid=2108 pid=5010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:59.794977 kernel: audit: type=1327 audit(1734099539.789:1482): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:59.789000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:59.797000 audit[5010]: NETFILTER_CFG table=nat:126 family=2 entries=51 op=nft_register_chain pid=5010 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:59.797000 audit[5010]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18564 a0=3 a1=ffffcd05e890 a2=0 a3=1 items=0 ppid=2108 pid=5010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:59.797000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:59.800141 kernel: audit: type=1325 audit(1734099539.797:1483): table=nat:126 family=2 entries=51 op=nft_register_chain pid=5010 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:00.080274 kubelet[1957]: E1213 14:19:00.080240 1957 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:19:00.326913 systemd[1]: Started sshd@20-10.0.0.118:22-10.0.0.1:49670.service. Dec 13 14:19:00.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.118:22-10.0.0.1:49670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:00.361000 audit[5012]: USER_ACCT pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:00.362378 sshd[5012]: Accepted publickey for core from 10.0.0.1 port 49670 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:19:00.362000 audit[5012]: CRED_ACQ pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:00.362000 audit[5012]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd11ca860 a2=3 a3=1 items=0 ppid=1 pid=5012 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:00.362000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:19:00.363818 sshd[5012]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:19:00.368040 systemd-logind[1210]: New session 21 of user core. Dec 13 14:19:00.368476 systemd[1]: Started session-21.scope. Dec 13 14:19:00.371000 audit[5012]: USER_START pid=5012 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:00.372000 audit[5020]: CRED_ACQ pid=5020 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:00.488174 sshd[5012]: pam_unix(sshd:session): session closed for user core Dec 13 14:19:00.488000 audit[5012]: USER_END pid=5012 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:00.488000 audit[5012]: CRED_DISP pid=5012 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:00.491113 systemd[1]: sshd@20-10.0.0.118:22-10.0.0.1:49670.service: Deactivated successfully. Dec 13 14:19:00.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.118:22-10.0.0.1:49670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:00.491895 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:19:00.492492 systemd-logind[1210]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:19:00.493458 systemd-logind[1210]: Removed session 21. Dec 13 14:19:05.492923 systemd[1]: Started sshd@21-10.0.0.118:22-10.0.0.1:54708.service. Dec 13 14:19:05.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.118:22-10.0.0.1:54708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:05.493695 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 14:19:05.493808 kernel: audit: type=1130 audit(1734099545.491:1493): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.118:22-10.0.0.1:54708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:05.532000 audit[5031]: USER_ACCT pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:05.533824 sshd[5031]: Accepted publickey for core from 10.0.0.1 port 54708 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:19:05.537173 kernel: audit: type=1101 audit(1734099545.532:1494): pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:05.536000 audit[5031]: CRED_ACQ pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:05.537626 sshd[5031]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:19:05.541148 kernel: audit: type=1103 audit(1734099545.536:1495): pid=5031 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:05.541222 kernel: audit: type=1006 audit(1734099545.536:1496): pid=5031 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 14:19:05.541241 kernel: audit: type=1300 audit(1734099545.536:1496): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc241b0a0 a2=3 a3=1 items=0 ppid=1 pid=5031 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:05.536000 audit[5031]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc241b0a0 a2=3 a3=1 items=0 ppid=1 pid=5031 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:05.543277 systemd[1]: Started session-22.scope. Dec 13 14:19:05.536000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:19:05.543438 systemd-logind[1210]: New session 22 of user core. Dec 13 14:19:05.544604 kernel: audit: type=1327 audit(1734099545.536:1496): proctitle=737368643A20636F7265205B707269765D Dec 13 14:19:05.546000 audit[5031]: USER_START pid=5031 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:05.547000 audit[5033]: CRED_ACQ pid=5033 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:05.552478 kernel: audit: type=1105 audit(1734099545.546:1497): pid=5031 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:05.552517 kernel: audit: type=1103 audit(1734099545.547:1498): pid=5033 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:05.667544 sshd[5031]: pam_unix(sshd:session): session closed for user core Dec 13 14:19:05.667000 audit[5031]: USER_END pid=5031 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:05.670094 systemd[1]: sshd@21-10.0.0.118:22-10.0.0.1:54708.service: Deactivated successfully. Dec 13 14:19:05.670874 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:19:05.667000 audit[5031]: CRED_DISP pid=5031 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:05.671368 systemd-logind[1210]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:19:05.672018 systemd-logind[1210]: Removed session 22. Dec 13 14:19:05.673265 kernel: audit: type=1106 audit(1734099545.667:1499): pid=5031 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:05.673320 kernel: audit: type=1104 audit(1734099545.667:1500): pid=5031 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:05.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.118:22-10.0.0.1:54708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:08.954394 kubelet[1957]: I1213 14:19:08.954342 1957 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:19:08.991000 audit[5044]: NETFILTER_CFG table=filter:127 family=2 entries=8 op=nft_register_rule pid=5044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:08.991000 audit[5044]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffd3e76a30 a2=0 a3=1 items=0 ppid=2108 pid=5044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:08.991000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:09.001000 audit[5044]: NETFILTER_CFG table=nat:128 family=2 entries=58 op=nft_register_chain pid=5044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:09.001000 audit[5044]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20452 a0=3 a1=ffffd3e76a30 a2=0 a3=1 items=0 ppid=2108 pid=5044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:09.001000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:10.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.118:22-10.0.0.1:54718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:10.671958 systemd[1]: Started sshd@22-10.0.0.118:22-10.0.0.1:54718.service. Dec 13 14:19:10.674651 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:19:10.674719 kernel: audit: type=1130 audit(1734099550.670:1504): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.118:22-10.0.0.1:54718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:10.708000 audit[5048]: USER_ACCT pid=5048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:10.709855 sshd[5048]: Accepted publickey for core from 10.0.0.1 port 54718 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 14:19:10.711372 sshd[5048]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:19:10.709000 audit[5048]: CRED_ACQ pid=5048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:10.714415 kernel: audit: type=1101 audit(1734099550.708:1505): pid=5048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:10.714488 kernel: audit: type=1103 audit(1734099550.709:1506): pid=5048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:10.714512 kernel: audit: type=1006 audit(1734099550.709:1507): pid=5048 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 14:19:10.715173 systemd-logind[1210]: New session 23 of user core. Dec 13 14:19:10.715680 systemd[1]: Started session-23.scope. Dec 13 14:19:10.716333 kernel: audit: type=1300 audit(1734099550.709:1507): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde04e4c0 a2=3 a3=1 items=0 ppid=1 pid=5048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:10.709000 audit[5048]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde04e4c0 a2=3 a3=1 items=0 ppid=1 pid=5048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:10.718181 kernel: audit: type=1327 audit(1734099550.709:1507): proctitle=737368643A20636F7265205B707269765D Dec 13 14:19:10.709000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:19:10.718000 audit[5048]: USER_START pid=5048 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:10.720000 audit[5050]: CRED_ACQ pid=5050 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:10.724784 kernel: audit: type=1105 audit(1734099550.718:1508): pid=5048 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:10.724818 kernel: audit: type=1103 audit(1734099550.720:1509): pid=5050 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:10.825801 sshd[5048]: pam_unix(sshd:session): session closed for user core Dec 13 14:19:10.825000 audit[5048]: USER_END pid=5048 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:10.828250 systemd[1]: sshd@22-10.0.0.118:22-10.0.0.1:54718.service: Deactivated successfully. Dec 13 14:19:10.829012 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:19:10.825000 audit[5048]: CRED_DISP pid=5048 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:10.829558 systemd-logind[1210]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:19:10.830468 systemd-logind[1210]: Removed session 23. Dec 13 14:19:10.831594 kernel: audit: type=1106 audit(1734099550.825:1510): pid=5048 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:10.831653 kernel: audit: type=1104 audit(1734099550.825:1511): pid=5048 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:19:10.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.118:22-10.0.0.1:54718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'